NS Lab Manual
NS Lab Manual
ARMCET
(Approved by AICTE & Affiliated to Anna University)
Registration Number :
Department :
Year of Study :
Semester :
ARM COLLEGE OF ENGINEERING AND TECHNOLOGY
SATTAMANGALAM, MARAIMALAI NAGAR, CHENNAI, TAMIL NADU. PIN-603 209.
ARMCET
(Approved by AICTE & Affiliated to Anna University)
BONAFIDE CERTIFICATE
Reg. No.
Aim:
To implement symmetric key algorithms for secure data encryption and decryption.
ALGORITHM:
Encryption Steps:
// Encryption
Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");
cipher.init(Cipher.ENCRYPT_MODE, secretKey);
byte[] encryptedBytes = cipher.doFinal(plaintext.getBytes("UTF-8"));
// Decryption
cipher.init(Cipher.DECRYPT_MODE, secretKey);
byte[] decryptedBytes =
cipher.doFinal(encryptedBytes);
String decryptedText = new String(decryptedBytes, "UTF-8");
Result:
Thus the java program to implement symmetric key algorithms is verified
successfully and output is verified.
EX.NO.:2
ASYMMETRIC KEY ALGORITHMS AND KEY EXCHANGE
DATE:
ALGORITHMS
Aim:
To implement asymmetric key algorithms and key exchange algorithms using Java
Program.
Algorithm:
Asymmetric Key Algorithms (RSA):
Key Generation:
1. Generate a pair of mathematically related keys: public key (for encryption) and private
key (for decryption).
2. Select two large prime numbers, `p` and `q`.
3. Calculate the modulus `n = p * q`.
4. Calculate the totient `phi(n) = (p - 1) * (q - 1)`.
5. Choose an integer `e` (the public exponent) such that `1 < e <phi(n)` and `gcd(e, phi(n))
= 1`.
6.
Calculate the modular multiplicative inverse `d` of `e` modulo `phi(n)` (`d * e 1 (mod phi(n))`).
Encryption:
1. Obtain the recipient's public key `(e, n)`.
2. Break the plaintext into smaller blocks.
3. For each block, calculate the ciphertext `c = m^e mod n`, where `m` is the plaintext
block. Decryption:
1. Use the recipient's private key `d` to calculate the original message `m = c^d mod
n`, where `c` is the ciphertext block.
Key Exchange Algorithms (Diffie-Hellman):
Key Generation:
1. Each party selects a large prime number `p` and a primitive root modulo `p`, denoted as
`g`.
Key Exchange:
1. Both parties select their secret private keys, `a` and `b`, respectively.
2. They each calculate their public keys: `A = g^a mod p` and `B = g^b mod p`.
3. They exchange these public keys.
4. Using the received public keys, each party calculates the shared secret: `s = B^a mod
p` and `s = A^b mod p`. Both parties now have the same shared secret `s`.
Program:
importjava.security.KeyPair;
importjava.security.KeyPairGenerator
; importjava.security.KeyAgreement;
importjavax.crypto.Cipher;
// Encryption
Cipher cipher = Cipher.getInstance("RSA");
cipher.init(Cipher.ENCRYPT_MODE, keyPair.getPublic());
byte[] encryptedBytes = cipher.doFinal(plaintext.getBytes());
// Decryption
cipher.init(Cipher.DECRYPT_MODE,
keyPair.getPrivate()); byte[] decryptedBytes =
cipher.doFinal(encryptedBytes);
String decryptedText = new String(decryptedBytes);
KeyAgreementkeyAgreement = KeyAgreement.getInstance("DiffieHellman");
keyAgreement.init(dhKeyPair.getPrivate());
Result:
Thus the java program to asymmetric key algorithms and key exchange algorithms is
executed successfully and output is verified.
EX.NO.:3
IMPLEMENT DIGITAL SIGNATURE SCHEMES
DATE:
Aim:
Algorithm:
Share the public key and private key with appropriate security measures.
Use the private key to generate a digital signature for the message.
Verify the authenticity of the message using the digital signature and the public key.
Attempt to verify messages with altered content or incorrect signatures to understand the
verification process.
Discuss the importance of digital signatures in ensuring data integrity and authentication.
Reflect on how the private key's security impacts the overall security of digital signatures.
Program:
importjava.security.*;
import java.util.Base64;
KeyPairGeneratorkeyPairGenerator = KeyPairGenerator.getInstance("RSA");
KeyPairkeyPair = keyPairGenerator.generateKeyPair();
Signature signature =
Signature.getInstance("SHA256withRSA");
signature.initSign(keyPair.getPrivate());
signature.update(message.getBytes());
verifier.initVerify(keyPair.getPublic());
verifier.update(message.getBytes());
booleanisVerified =
verifier.verify(digitalSignature); if (isVerified) {
System.out.println("Digital Signature Verified: The message is authentic.");
} else {
}
Output:
Result:
Thus the java program to digital signature schemes is executed successfully and
output is verified.
EX.NO.:4
INSTALLATION OF WIRE SHARK, TCPDUMP
DATE:
Aim:
The aim of this lab activity is to install Wireshark and tcpdump, observe data
transferred in client-server communication using UDP/TCP protocols, and identify UDP/TCP
datagrams for better understanding of network traffic analysis and protocol behavior.
Algorithm:
Install tcpdump using the package manager (e.g., apt-get, yum) on Linux systems.
Set up a basic client-server communication scenario using UDP or TCP (e.g., sending
messages from a client to a server).
communication.
Analyze the captured UDP datagrams, noting source and destination ports, payload data,
and other relevant information.
Analyze the captured TCP segments, noting source and destination ports, sequence and
acknowledgment numbers, flags (such as SYN, ACK), and payload data.
Step 6: Discussion and Analysis
Compare the characteristics of UDP datagrams and TCP segments observed in the captured
network traffic.
Discuss the advantages and disadvantages of using UDP and TCP for different types of
applications.
Step 7: Reflection
Installing Wireshark:
2. Download and install Wireshark for your operating system (Windows, macOS, or Linux).
Installing tcpdump:
- On Linux:
- Open a terminal.
- For example, on Debian/Ubuntu, you can use: `sudo apt-get install tcpdump`
3. Write a simple client-server program or use command-line tools (e.g., `nc` for TCP,
`ncat` for UDP) to simulate communication.
- Wireshark:
1. Open Wireshark.
2. Select the network interface through which the client and server communicate.
- tcpdump:
1. Open a terminal.
1. After capturing traffic, you can stop the capture in Wireshark or tcpdump.
2. In Wireshark:
- Click on a packet to view its details, including source and destination ports, payload
data, and more.
3. Intcpdump:
- Open the captured pcap file with Wireshark for graphical analysis.
- Use the same display filters (`udp`, `tcp`) to focus on UDP or TCP
- In Wireshark or tcpdump, look for packets with a UDP protocol. You'll see source
and destination port numbers and the payload data.
- In Wireshark or tcpdump, look for packets with a TCP protocol. You'll see source and
destination port numbers, sequence numbers, acknowledgment numbers, flags (such as
SYN, ACK), and the payload data.
Result:
Thus the command for various activities is executed successfully and output is
verified
EX.NO.:5
CHECK MESSAGE INTEGRITY AND CONFIDENTIALITY USING
DATE:
SSL
Aim:
Write a Java program to check message integrity and confidentiality using ssl
Algorithm:
Share the public key and private key with appropriate security measures.
Use the private key to generate a digital signature for the message.
Verify the integrity of the message using the SSL and the public key.
Attempt to verify messages with altered content or incorrect SSl to understand the integrity
and confidentiality process.
Reflect on how the private key's security impacts the overall security of SSL.
Program:
Serverside:
importjavax.net.ssl.*;
import java.io.*;
SSLServerSocketFactoryserverSocketFactory = (SSLServerSocketFactory)
SSLServerSocketFactory.getDefault();
SSLServerSocketserverSocket =
(SSLServerSocket)
serverSocketFactory.createServerSocket(9999);
serverSocket.accept(); System.out.println("Connection
established.");
in.close();
clientSocket.close();
serverSocket.close();
}
Client Side:
importjavax.net.ssl.*;
import java.io.*;
{ SSLSocketFactorysocketFactory = (SSLSocketFactory)
PrintWriter(socket.getOutputStream(), true);
System.out.println("Message sent.");
out.close();
socket.close();
}
Output:
Server:
Client:
Result:
Thus the java program to check message integrity and confidentiality using ssl is
executed successfully and output is verified.
EX.NO.:6(a)
EAVESDROPPING
DATE:
AIM :
ALGORITHM:
AIM:
ALGORITHM:
Create a Java Project: Start by creating a Java project in your favorite integrated development
environment (IDE) or a simple text editor.
STEP 1:
Import Required Libraries: You'll need libraries for hash functions and file handling. Import the
necessary libraries.
STEP 2: Read the List of Hashed Passwords: Create a method to read the list of hashed
passwords from a file. Assume the hashed passwords are stored in a file, one hash per line
STEP 3: Load the Dictionary: Create a method to load a dictionary file containing words or phrases
you want to try as passwords
STEP 4: Perform the Dictionary Attack: Create a method to perform the dictionary attack
STEP 5: Main Method: In your main method, call the above methods to read hashed passwords, load
the dictionary, and perform the dictionary attack
STEP 6: Prepare Input Files: Create two text files, one for the hashed passwords
(hashed_passwords.txt) and one for the dictionary ( dictionary.txt). Populate them with the appropriate
data.
STEP 7: Run the Program: Run the Java program, and it will attempt to match the hashed
passwords from your input file with the words or phrases in the dictionary file.
PROGRAM:
Server side:
import java.io.*;
import java.net.*;
importjavax.net.ssl.*
SSLServerSocketFactoryserverSocketFactory = (SSLServerSocketFactory)
SSLServerSocketFactory.getDefault();
SSLServerSocketserverSocket
= (SSLServerSocket)
serverSocketFactory.createServerSocket(port);
while (true) {
BufferedReader in = new
BufferedReader(new
InputStreamReader(clientSocket.getInputStream()));
clientSocket.close();
}
Client side:
import java.io.*;
import java.net.*;
importjavax.net.ssl.*
BufferedReader in = new
BufferedReader(new
InputStreamReader(socket.getInputStream()));
out.println("Hello, Server!");
socket.close();
}
Output:
Server side:
Client side:
RESULT:
Thus the java program to implement Eavesdropping is executed successfully and output is
verified.
EX.NO.:6(b)
DATE:
DICTIONARY ATTACKS
AIM:
ALGORITHM:
Create a Java Project: Start by creating a Java project in your favorite integrated development
environment (IDE) or a simple text editor.
STEP 1:
Import Required Libraries: You'll need libraries for hash functions and file handling. Import the
necessary libraries.
STEP 2: Read the List of Hashed Passwords: Create a method to read the list of hashed
passwords from a file. Assume the hashed passwords are stored in a file, one hash per line
STEP 3: Load the Dictionary: Create a method to load a dictionary file containing words or phrases
you want to try as passwords
STEP 4: Perform the Dictionary Attack: Create a method to perform the dictionary attack
STEP 5: Main Method: In your main method, call the above methods to read hashed passwords, load
the dictionary, and perform the dictionary attack
STEP 6: Prepare Input Files: Create two text files, one for the hashed passwords
(hashed_passwords.txt) and one for the dictionary ( dictionary.txt). Populate them with the appropriate
data.
STEP 7: Run the Program: Run the Java program, and it will attempt to match the hashed
passwords from your input file with the words or phrases in the dictionary file.
PROGRAM:
importjava.io.BufferedReader;
importjava.io.FileReader;
importjava.io.IOException;
booleanaccessGranted = false;
{ String password;
if (authenticate(username, password)) {
System.out.println("Access granted for username: " + username + " with password: " +
password);
accessGranted =
true; break;
} catch (IOException e)
{ e.printStackTrace();
if (!accessGranted) {
// In a real system, this function would check if the provided username and password are
correct.
returnpassword.equals("123456");
Output:
If the program does not find a matching password in the dictionary, it will print:
Result:
Thus the java program to implement Dictionary attackis executed successfully and
output is verified.
EX.NO.:6(c)
DATE:
MAN-IN-THE-MIDDLE
AIM :
INTRODUCTION :
sudo cd xerosploit
sudo python
install.py
scan
Step 7: Select the target and run the module you want to execute.
Result:
Thus the man in the middle attacks discussed and all the modules are executed.
EX.NO:7
DATE:
SNIFF TRAFFIC USING ARP POISONING
AIM:
ipconfig /all
You will get detailed information about all the network connections available on your
computer. The results shown below are for a broadband modem to show the MAC address
and IPv4 format and wireless network to show IPv6 format.
ARP is the acronym for Address Resolution Protocol. It is used to convert IP address to
physical addresses [MAC address] on a switch. The host sends an ARP broadcast on the
network, and the recipient computer responds with its physical address [MAC Address].
The resolved IP/MAC address is then used to communicate. ARP poisoning is sending
fake MAC addresses to the switch so that it can associate the fake MAC addresses with
the IP address of a genuine computer on a network and hijack the traffic.
ARP poisoning detection software: these systems can be used to cross check the IP/MAC
address resolution and certify them if they are authenticated. Uncertified IP/MAC address
resolutions can then be blocked.
Operating System Security: this measure is dependent on the operating system been used.
The following are the basic techniques used by various operating systems.
We are using Windows 7 for this exercise, but the commands should be able to work on other
versions of windows as well.
arp –a
HERE,
Static entries are added manually and are deleted when the computer is restarted, and the
network interface card restarted or other activities that affect it.
Open the command prompt then use the ipconfig /all command to get the IP and MAC
address
The MAC address is represented using the Physical Address and the IP address is
IPv4Address
Note: The IP and MAC address will be different from the ones used here. This is
because they are unique.
arp –a
Note the IP address has been resolved to the MAC address we provided and it is of a static
type.
arp –d 192.168.1.38
P.S. ARP poisoning works by sending fake MAC addresses to the switch
RESULT:
The expected output is achieved with the command of Sniff Traffic Using Arp
Poisoning
EX.NO:8
DATE:
INTRUSION DETECTION
AIM:
Todemonstrate
IntrusionDetectionSystem(ID
S) usingSnortsoftware tool.
STEPSONCONFIGURINGANDINTRUSIONDETECTION:
1. DownloadSnort fromtheSnort.orgwebsite.
(http://www.snort.org/snort-downloads)
2. DownloadRules(https://www.snort.org/snort-
rules).Youmustregistertogettherules.
(Youshoulddownloadtheseoften)
3. Double click on the .exe to install snort. This will install snort in the
“C:\Snort”folder.ItisimportanttohaveWinPcap(https://www.winpcap.org/
in stall/)installed
4. ExtracttheRulesfile.YouwillneedWinRARforthe.gzfile.
5. Copyallfilesfromthe“rules”folderoftheextractedfolder.Nowpastetherule
sinto“C:\Snort\rules”folder.
6. Copy“snort.conf”filefromthe“etc”folderoftheextractedfolder.Youmu
st pasteit into“C:\Snort\etc”folder.Overwriteany
existingfile.Rememberifyoumodifyyoursnort.conffileanddownloadane
wfile,youmustmodify itforSnort towork.
7. Openacommandprompt(cmd.exe)andnavigateto
folder“C:\Snort\bin”folder.(atthePrompt,typecd\snort\bin)
8. Tostart(execute)snortinsniffer
modeusefollowingcommand:snort-dev-
i3
-iindicates
theinterfacenumber.Youmustpickthecorrectinterfacenumber.Inmycase,itis3
.
Example:
examplesnort
12. ChangetheRULE_PATHvariabletothepathofrulesfol
d er.var RULE_PATH c:\snort\rules
pathtorules
13. Changethepathofalllibraryfiles withthenameandpathonyoursystem.
andyoumustchange thepath of snort_dynamicpreprocessorvariable.C:\
Snort\lib\snort_dynamiccpreproces sor
You need to do this to all library files in the “C:\Snort\lib” folder. The old
pathmightbe:“/usr/local/lib/
…”.youwillneedto replacethatpathwithyoursy
stempath.UsingC:\Snort\lib
14. Changethepathofthe“dynamicengine”variablevalueinthe“snort.co
n f”file..
Example: dynamicengineC:\Snort\lib\snort_dynamicengine\
sf_engine.dll
15. Addthepathsfor“includeclassification.config”and“includereference.config”
files.
includ
e
c:\snort\etc\
classification.configin clude c:\
snort\etc\reference.config
16. Removethecomment(#)onthelinetoallowICMPrules,ifitiscommented
w itha#.
include$RULE_PATH/icmp.rules
17. YoucanalsoremovethecommentofICMP-
inforulescomment,ifit iscommented.
include $RULE_PATH/icmp-info.rules
18. To add log files to store alerts generated by snort, search for
the “output log”test insnort.confandaddthefollowingline:
outputalert_fast:snort-alerts.ids
19. Comment (add a #) the whitelist
$WHITE_LIST_PATH/white_list.rules
andtheblacklistChangethenested_ipinner,\
tonested_ipinner#,\
20. Commentout(#)following
l
ines:#preprocessornormalize
_ ip4
#preprocessornormalize_tcp:ipsecnst
ream#preprocessornormalize_icmp4
#preprocessornormalize_ip6
#preprocessornormalize_icmp6
21. Savethe“snort.conf”file.
22. TostartsnortinIDSmode, runthefollowingcommand:
snort-cc:\snort\etc\snort.conf-lc:\snort\log-
i3(Note:3isusedformyinterfacecard)
If a log is created, select the appropriate program to open it. You can
useWordPard or NotePad++toread thefile.
TogenerateLogfilesinASCII
mode,youcanusefollowingcommandwhilerunningsnortinIDSmod
e: snort-Aconsole-i3-c c:\Snort\etc\snort.conf-lc:\Snort\log-
Kascii
23. Scan the computer that is running snort from another computer
by using PINGorNMap(ZenMap).
Afterscanningorduringthescanyoucancheckthesnort-
alerts.idsfileinthelogfoldertoinsureitisloggingproperly.YouwillseeIPaddressf
ol ders appear.
Snortmonitoringtraffic–
RESULT:
ThustheIntrusionDetectionSystem(IDS)
hasbeendemonstratedbyusingtheOpenSourceSnortIntrusionDetectionTool.
EX.NO:9
DATE:
NETWOTK MONITORING TOOLS
AIM
To achieve the network monitoring tools with the required function and softwares
INTROUDCTION:
Networks are the fundamentals behind businesses worldwide. It plays a pivotal role in
serving your employees for administrative purposes and your clients across the continents.
The networks help you keep information in a centralized location - accessible to those who
need and restrict every other inbound request. So how do you provide continuous top-
notch end user experience and maintain your rapidly evolving network? Only by
monitoring the availability, health, and performance of your networks over time with the
help of reliable, real-time network monitoring tools.
scalability
automation
user management
Learning that your network is down from your end users is the nightmare that every IT admin
tries to avoid. The network monitoring application and its reporting tools must provide
performance insights into your network in real time. This helps you identify performance
hiccups early and avoid potential outages.
Scalability
Automation
User Management
User Management helps organizations ensure network security by providing access to the
designated users only. Apart from providing access to users with roles, the network
monitoring tool should also define the scope for users. This helps IT teams with multiple
staffs as it clearly defines their operational boundaries. Network monitoring tools with the
above features are excepetionally benefiting to your business.
OpManager is a powerful network management and monitoring tool that monitors switches,
routers, servers, WLC, load balancers, VPN, printers, firewalls, VMs, Nutanix environments,
and anything that has an IP and connected to the network - in a single console.
1. top features
3. customer reviews
Top features:
Switch/Router monitoring
Network switches and routers form the backbone of any IT infrastructure. Any issue with
switch breaks the end user connectivity with the network. Using OpManager, you can
monitor switches, and routers from the likes of Cisco, Juniper, Aruba, ZTE, and many other
vendors for availability, health, and performance in real-time for 2,000+ parameters and
avoid possible network pitfalls. Apart from monitoring switches, OpManager maps switch
ports to devices and monitors the availability of the switch ports.
Network interface monitoring
Network interfaces are one of key performance indicators (KPI) as they help identify
network performance degradation at the earliest. OpManager, the best network monitoring
tool, monitors interfaces using SNMP and provides a single customizable dashboard to view
and analyze bandwidth performance and network traffic for your IT network. You can
monitor interfaces by checking the availability status of interfaces and monitor traffic speed
on the interface, errors, discards, etc. using OpManager.
WLC monitoring
OpManager's multi-vendor WLC monitoring module allows you to keep your network intact
by providing in-depth visibility of your wireless LAN controller (WLC), its associated
service set identifiers (SSIDs) and access points (APs). Cisco's WLC monitoring tool in
OpManager allows direct discovery of Cisco WLC and their associated SSIDs, APs and
helps you monitor the overall performance of your wireless network with the help of Cisco
WLC monitor. The WLC snapshot page provides inventory information, the device
availability status, and other similar information. In addition, knowing the top five access
points based on usage tells you who the top talkers are in your WLC environment, and
custom dials display information on various parameters, including CPU and memory usage.
VPN monitoring
Organizations allow connections into their networks through VPNs for their remote
workforce. These connections can sometimes be compromised, resulting in data theft or
network attacks. With a monitoring tool like OpManager, you can monitor your VPN by
tracking the number of active VPN sessions, VPN tunnel status, and VPN tunnels count in
real time, and also receive instant alerts on VPN connection regularities making your
network secure and keeping your remote productivity issues at bay.
Hybrid environment monitoring
Mobile application
Access your OpManager's network monitoring and reporting anytime and anywhere using
the new ManageEngineOpManager mobile application. Available for both Android and iOS,
this
lets you visualize your infrastructure, act on the alerts, drill-down to the root cause of the
problem without having to be physically present in your server room to resolve a fault!
Apart from the above, OpManager, your comprehensive network monitoring solution
monitors Windows servers, Linux servers, storage devices, Windows services, processes and
scales upto 30,000 devices out of the box. This network software makes network monitoring
effortless with intelligent automations, ML-based forecasting, and extensive protocol
support. Here are some of OpManager'snetwork monitoring applications:
1. Storage capacity forecasting: With the help of ML-based forecasting techniques, this
network monitoring and reporting software pinpoints when the device storage will reach
80 percent, 90 percent, and 100 percent of the allocated storage, and helps with planning
purchase decisions.
2. Notification profiles:OpManager lets you notify network faults via Slack channels,
trouble tickets, emails, SMS, and web alarms if they are not acknowledged, so no alarm
goes unnoticed.
3. Alarm Escalation: Alarm escalation rules can be configured for mission-critical devices
such as application servers, so any fault pertaining to availability, health, and performance is
escalated to a higher authority via email or SMS based on user-defined criteria.
4. Support for multiple vendors:OpManager offers support for more than 53,000 vendor
templates, so you can efficiently manage your network devices from vendors such as
Cisco, Juniper, Fortigate, and many more. These templates can also be customized to
address your organization's unique needs.
5. Support for wide range of protocols:OpManager supports communication protocols such
as ICMP, and LAN management protocols such as SNMP, WMI, CLI, and more.
6. Discovery Rule Engine: Discovery Rule Engine automatically associates device
templates and rules to network devices as defined by the user, thereby automating routine
tasks, and saving valuable time and resources.
7. In-built troubleshooting tools:OpManager offers multiple tools such as Ping, SNMP
Ping, Proxy Ping, Traceroute, WMI Query Tool, CLI Query Tool, and more that aid in
troubleshooting network issues within OpManager.
8. Dashboards:OpManager provides intuitive dashboards that provide a 360-degree view
of your entire IT infrastructure on one screen, and makes fault identification easier.
9. Visualizations: Determine the availability of crucial services in multiple branch offices with
maps and business views. With OpManager, you can easily monitor remote locations
visually, and get alerted in real time before network services are disrupted.
10. Multi-level thresholds:OpManager offers multi-level thresholds with color codes, so you
can identify show-stopping network faults and promptly take action.
Result:
The modules are executed with the commands of network monitoring tools
EX.NO:10 (a )
DATE:
FIREWALL
AIM
To Knows The Uses Of Firewall And Their Uses In Winodws
INTRODUCTION
A firewall is a network security device, either hardware or software-based, which monitors all
incoming and outgoing traffic and based on a defined set of security rules it accepts, rejects or
drops that specific traffic. Please refer to the article Introduction of Firewall in Computer
Network for more details. We can configure 2 types of firewalls on Windows on the basis of
firewall provider:
Now to configure the firewall according to your requirement, click Advanced settings. You
will be prompted by User Account Control to give Administrative access to Windows
Defender to make changes. Click Yes to proceed.
Step 8: Windows Defender Firewall with Advanced Security window will launch after
giving administrative permission.
Step 11: Now we will configure an inbound rule for a network port. A New Inbound Rule
Wizard window pops-up, select Port option and click next.
Step 12: Now select TCP and specify port number 65000.
Step 13: Now we can select the action we need to take on this port. We will block the
inbound connection by selecting Block the connection option then click Next.
Step 14: Here we can specify when should this rule come into action. We will keep only
Public option selected and move Next.
Step 15: This is the last step. Here we provide a name to this rule so that we can keep track of
it later in the Inbound rules list. Write the name “65000 Port Block (Public)”. Click Finish.
Step 16: The inbound rule is successfully created. We can find “65000 Port Block (Public)”
in the Inbound rules list.
Step 17: Right-click the rule we just created and there are multiple options with which it
can be Disabled or Deleted.
RESULT :
AIM:
Configuring a Virtual Private Network (VPN) involves setting up a secure and encrypted
connection between your device and a remote server. VPNs are commonly used to enhance
online privacy, security, and anonymity. Below, I'll provide a general overview of how to
configure a VPN:
1. Choose a VPN Service: Start by selecting a reputable VPN service provider. There
are many options available, such as NordVPN, ExpressVPN, CyberGhost, and
many more. Subscribe to the VPN service and follow their setup instructions.
2. Download and Install the VPN Client: Most VPN services offer dedicated apps for
various platforms, including Windows, macOS, iOS, Android, and Linux. Download
the appropriate VPN client for your device, and install it.
3. Launch the VPN Client: Open the VPN client on your device. You may need to log
in using your VPN service credentials.
4. Connect to a VPN Server: In the VPN client, choose a server location to which
you want to connect. VPN services typically offer servers in various countries. Your
choice of server location may affect your internet speed and the websites or services
you can access.
5. Optional Configuration Settings: VPN clients often provide advanced settings that
you can configure to meet your specific needs. These settings might include the
VPN protocol (e.g., OpenVPN, L2TP, or IKEv2), a kill switch to stop internet
traffic if the VPN connection drops, split tunneling to specify which apps or
websites use the VPN, etc. Configure these settings according to your requirements.
6. Connect to the VPN: Click or tap the "Connect" or "Start" button in the VPN
client to establish a connection to the selected server. Once the connection is
established, your internet traffic will be encrypted and routed through the VPN
server.
7. Verify Your Connection: You can verify that your VPN connection is active
by visiting a website like "WhatIsMyIP" to confirm that your IP address is now
associated with the VPN server location.
8. Use the Internet Securely: Your internet activity is now encrypted and secure.
You can access blocked content, enhance your privacy, and protect your data from
eavesdropping on public Wi-Fi networks.
9. Disconnect from the VPN: When you're finished using the VPN, disconnect
from the server by using the VPN client.
10. Customize Your Experience: Some VPN services offer additional features, such as
ad-blocking, anti-malware, and more. Explore your VPN service's features to see
how you can tailor your VPN experience.
It's essential to choose a trusted VPN service, as they have access to your internet traffic. Be
sure to read their privacy policy and terms of service to understand their data handling
practices. Additionally, keep your VPN software and device operating system up to date to
ensure the highest level of security.
Architecture of VPN
1. CleanWeb
CleanWeb was able to block ads that managed to slip even past our regular ad blockers.
2. MultiHop
The MultiHop option provides some additional security but does have a negative impact on
your internet speeds. After all, your traffic has to go through two VPN servers instead of one.
3. Whitelister
The Whitelister for apps and websites allows you to connect to specific apps and websites
you trust using your own IP address instead of that of the VPN server (split tunneling).
4. Surfshark Alert
Surfshark Alert is an option you can use that will notify you when your email or passwords
might be in danger of being compromised.
5. Surfshark Search
Surfshark has specialized P2P servers that help you download torrents securely. You don’t
have to manually select these servers: they are automatically activated when you open a
torrenting program.
7. Camouflage Mode
8. NoBorders Mode -
NoBorders Mode is a mode in which you can use Surfshark and access the internet freely
even in restrictive regions. When Surfshark detects any kind of restrictions on your network,
it automatically enables the NoBorders mode. This gives you a selected list of servers that
perform well despite network restrictions.
9. GPS spoofing
Recently, Surfshark has added a GPS spoofing function to its service. GPS spoofing allows
you to change your virtual location, even when it isn’t based on your IP address. Surfshark’s
GPS spoofing option is only available on Android for now.
A kill switch is an essential security feature for any VPN. It instantly “kills” your internet
connection if your VPN stops working for whatever reason. This prevents data leaks
(like your IP address) and keeps you protected when your VPN falters. Surfshark offers a
kill
switch on Windows, macOS, iOS, and Android. You can turn it on by going into the
settings in the Surfshark app.
Surfshark has a “no-logs’’ policy. They have made every effort to require as little personal
information from you as possible for your VPN to work. Secondly, Surfshark — like most
VPNs — requires certain information to monitor their service. For example, they use
anonymized information to keep track of how busy their servers are and to see if there are
any connection issues. As mentioned previously, they have a strict “no-logs” policy, and we
couldn’t find anything in their regulations that contradict this.
COCLUSION
Furthermore, Surfshark recently switched to a RAM-only server network, which means that
there is no longer any data on physical servers. This form of storage also ensures that data is
automatically deleted when you disconnect. Your data will therefore only be stored
temporarily and cannot be retrieved afterward. In addition, Surfshark is one of the first VPNs
to offer two-factor authentication (2FA). This means logging in happens through two steps,
which is an effective way to protect yourself against all kinds of online attacks. For Surfshark
Alert users, this two-step authentication is mandatory, while the ‘normal’ Surfshark user can
choose to use it for extra protection.
RESULT: