IT6712 Security Lab Record For Print
IT6712 Security Lab Record For Print
NO: 06
DATE:
Demonstrate how to provide secure data storage, secure data transmission and for creating
digital signatures (GnuPG)
Aim:
To demonstrate how to provide secure data storage, secure data transmission and how to
create digital signatures Using GPA
Procedure:
4. Generate key by Selecting Algorithm, Key Size and specify Name, Email also check
Expires if you want to specify key expiry date and Click Ok.
7. If the ‘passphrase’ is not strength, a dialog will be shown.Click “Take this one anyway”
if you do not want to change phrase key. Otherwise if you want to change the
“passphrase”, click “Enter new passphrase”.
4. Select the public key of the receiver to Encrypt and for sign select the sender
private key. And click Ok.
The Decrypted message will be shown in, GNU Privacy assistant – Clipboard
Result:
Thus the demonstration to provide secure data storage, secure data transmission and to
create digital signatures is done successfully and output is verified.
EX.NO: 07
DATE:
Aim:
To demonstrate and set up a Honeypot and Monitor the Honeypot on the given network
Honey Pot is a device placed on Computer Network specifically designed to capture malicious
network traffic.
KF Sensor is the tool to setup as honeypot when KF Sensor is running it places a siren icon in the
windows system tray in the bottom right of the screen. If there are no alerts then green icon is
displayed.
Download KF Sensor Evaluation Set File from KF Sensor Website. Install with
License Agreement and appropriate directory path. Reboot the Computer now.
The KF Sensor automatically starts during windows boot Click Next to setup
wizard. Select all port classes to include and Click Next.
Send the email and Send from email enter the ID and Click Next.
Select the options such as Denial of Service [DOS], Port Activity, Proxy
Emulsion, Network Port Analyzer, Click Next.
Click finish.
Result:
Thus the demonstration to set up a Honeypot and Monitor the Honeypot on the given
network using KF-Sensor is done successfully and output is verified.
EX.NO: 08
DATE:
Aim:
To perform wireless audit on an access point or a router and decrypt WEP and WPA using
Net Stumbler
Steps to be followed:
2. It is highly recommended that your PC should have wireless network card in order to access
Wireless router
4. There are several indicators regarding the strength of the signal, such as GREEN indicates
Strong, YELLOW and other color indicates a Weaker signal, RED indicates a Very Weak and
GREY indicates a Signal Loss.
5. Lock symbol with GREEN bubble indicates the Access point has encryption enabled.
6. MAC assigned to Wireless Access Point is displayed on right hand pane.
7. The next column displays the Access Points Service Set Identifier [SSID] which is useful to
crack the password.
In using the Windows version of Wireshark and you have an AirPcap adapter you can add
decryption keys using the wireless toolbar. If the toolbar isn’t visible, you can show it by
selecting View Wireless Toolbar. Click on Decryption keys button on the toolbar.
This will open the decryption key management window. As shown in the window you can select
between three decryption modes: None, Wireshark and Driver.
Result:
Thus the demonstration to set up and to perform wireless audit on an access point or a
router and decrypt WEP and WPA using Net Stumbler
EX.NO: 09
DATE:
Aim:
To Study about installing rootkits and variety of options available for rootkits
Rootkit is a stealth type of malicious software designed to hide the existence of certain process
from normal methods of detection and enables continued privileged access to a computer.
Select Processes menu and kill any unwanted process if any. Modules menu
displays the various system files like .sys, .dll
Services menu displays the complete services running with Autostart, Enable,
Disable, System, and Boot.
CMD allows the user to interact with command line utilities or Registry.
Result:
Thus the study installing rootkits and variety of options available for rootkits is done
successfully
EX.NO: 10
DATE:
Aim:
To understand the execute various commands using snort for setting up Network intrusion
detection and prevention techniques
C:\Snort\bin>snort -V
Copyright (C) 2014-2016 Cisco and/or its affiliates. All rights reserved.
To verify that Snort is installed and running correctly you can run a couple of commands
from the Command Prompt
C:\Snort\bin>snort.exe -W
Copyright (C) 2014-2016 Cisco and/or its affiliates. All rights reserved.
To set fast alert mode, write the alert in a simple format with a timestamp, alert message, source
and destination IPs/ports
C:\Snort\bin>snort -A fast
Options:
-A Set alert mode: fast, full, console, test or none (alert file alerts only)
-B <mask> Obfuscated IP addresses in alerts and packet dumps using CIDR mask
-v Be verbose
Result:
Thus the execution of various commands using snort for setting up Network intrusion detection
and prevention techniques is done successfully and output is verified.