Professional Documents
Culture Documents
Remove any punctuation or characters that are not present in the key square (this may
mean spelling out numbers, punctuation etc.).
2.
Identify any double letters in the plaintext and replace the second occurence with an 'x'
e.g. 'hammer' -> 'hamxer'.
3.
If the plaintext has an odd number of characters, append an 'x' to the end to make it even.
4.
Break the plaintext into pairs of letters, e.g. 'hamxer' -> 'ha mx er'
5.
6.
Locate the letters in the key square, (the examples given are using the key square above)
a.
If the letters are in different rows and columns, replace the pair with the letters on
the same row respectively but at the other pair of corners of the rectangle defined by
the original pair. The order is important the first encrypted letter of the pair is the one
that lies on the same row as the first plaintext letter. 'ha' -> 'bo', 'es' -> 'il'
Page 1
If the letters appear on the same row of the table, replace them with the letters to
their immediate right respectively (wrapping around to the left side of the row if a
letter in the original pair was on the right side of the row). 'ma' -> 'or', 'lp' -> 'pq'
c.
If the letters appear on the same column of the table, replace them with the letters
immediately below respectively (wrapping around to the top side of the column if a
letter in the original pair was on the bottom side of the column). 'rk' -> 'dt', 'pv' -> 'vo'
Source Code :
// Implementation of Play Fair Cipher Algorithm in Java Language
package New;
import java.util.*;
class Basic{
String allChar="ABCDEFGHIJKLMNOPQRSTUVWXYZ";
boolean indexOfChar(char c)
{
for(int i=0;i < allChar.length();i++)
{
if(allChar.charAt(i)==c)
return true;
}
return false;
}
}
class PlayFair{
Basic b=new Basic();
char keyMatrix[][]=new char[5][5];
boolean repeat(char c)
{
if(!b.indexOfChar(c))
{
return true;
}
for(int i=0;i < keyMatrix.length;i++)
{
for(int j=0;j < keyMatrix[i].length;j++)
{
if(keyMatrix[i][j]==c || c=='J')
return true;
Page 2
Page 3
Page 4
Page 5
Page 6
}
class PlayFairCipher{
public static void main(String args[])throws Exception
{
PlayFair p=new PlayFair();
Scanner scn=new Scanner(System.in);
String key,cipherText,plainText;
System.out.println("Enter plaintext:");
Page 7
Output:
Page 8
TOOL DEMONSTRATION
Tool Name: Wireshark
Description and Working:
Wireshark is a Free and Open packet analyzer. It is used for network troubleshooting, analysis,
software and communications protocol development, and education. Originally named Ethereal,
the project was renamed Wireshark in May 2006 due to trademark issues. Wireshark is very
similar to tcpdump, but has a graphical front-end, plus some integrated sorting and filtering
options.
Wireshark is a program that "understands" the structure (encapsulation) of different networking
protocols. It can parse and display the fields, along with their meanings as specified by different
networking protocols. Wireshark uses pcap to capture packets, so it can only capture packets on
the types of networks that pcap supports.
Wireshark is the world's foremost network protocol analyzer, and is the de facto standard across
many industries and educational institutions.
Some of the features it provides are:
Deep inspection of hundreds of protocols, with more being added all the time
Live capture and offline analysis
Standard three-pane packet browser
Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many
others
Data can be captured "from the wire" from a live network connection or read from a file
of already-captured packets.
Live data can be read from a number of types of networks, including Ethernet, IEEE
Page 9
VoIP calls in the captured traffic can be detected. If encoded in a compatible encoding,
The user typically sees packets highlighted in green, blue, and black. Wireshark uses colors to
help the user identify the types of traffic at a glance. By default, green is TCP traffic, dark blue is
DNS traffic, light blue is UDP traffic, and black identifies TCP packets with problems for
example, they could have been delivered out-of-order. Users can change existing rules for
coloring packets, add new rules, or remove rules.
Page 10
Page 11
Page 12
NetStumbler (also known as Network Stumbler) is a tool for Windows that facilitates detection
of Wireless LANs using the 802.11b, 802.11a and 802.11g WLAN standards. It runs on
Microsoft Windows operating systems from Windows 2000 to Windows XP. A trimmed-down
version called MiniStumbler is available for the handheld Windows CE operating system.
It has many uses:
NetStumbler provides a lot more than just the name (SSID) of the wireless network. It provides
the MAC address, Channel number,encryption type, and a bunch more. All of these come in use
when we decide that we want to get in the secured network by cracking the encryption.
Page 13
Page 14
Netcat (often abbreviated to nc) is a computer networking utility for reading from and writing to
network connections using TCP or UDP. Netcat is designed to be a dependable back-end that can
be used directly or easily driven by other programs and scripts. At the same time, it is a featurerich network debugging and investigation tool, since it can produce almost any kind of
connection its user could need and has a number of built-in capabilities.
Its list of features includes port scanning, transferring files, and port listening, and it can be used
as a backdoor.
The original netcat's features include:[1]
Page 15
Featured tunneling mode which permits user-defined tunneling, e.g., UDP or TCP, with
the possibility of specifying all network parameters (source port/interface, listening
port/interface, and the remote host allowed to connect to the tunnel).
Page 16
Figure 2: shows how to set up the server using netcat in listening mode. We will use port 12345
and will specify the port number with -p option.
Tool Name: tcpdump
Description and Working:
Tcpdump is a common packet analyzer that runs under the command line. It allows the user to
display TCP/IP and other packets being transmitted or received over a network to which the
computer is attached. Distributed under the BSD license, tcpdump is free software.
Tcpdump
works
on
X, HP-
UX, Android and AIX among others. In those systems, tcpdump uses the libpcap library to
capture packets. The port of tcpdump for Windows is called WinDump; it uses WinPcap, the
Windows port of libpcap.
Tcpdump prints the contents of network packets. It can read packets from a network interface
card or from a previously created saved packet file. Tcpdump can write packets to standard
output or a file.
Page 17
Page 18
Nmap (Network Mapper) is a security scanner originally written by Gordon Lyon ) used to
discover hosts and services on a computer network, thus creating a "map" of the network. To
accomplish its goal, Nmap sends specially crafted packets to the target host and then analyzes the
responses.
The software provides a number of features for probing computer networks, including host
discovery and service and operating system detection. These features are extensible by scripts
that provide more advanced service detection, vulnerability detection, and other features. Nmap
Page 19
Host discovery Identifying hosts on a network. For example, listing the hosts that
respond to TCP and/or ICMP requests or have a particular port open.
Nmap can provide further information on targets, including reverse DNS names, device types,
and MAC addresses.
Nmap website : www.nmap.org
Page 20
Page 21
Page 22
Page 23
Features:
Password management
Passwords stored by this application can be further divided into manageable groups. Each group
can have an identifying icon. Groups can be further divided into subgroups in a tree-like
organization.
Further, KeePass tracks the creation time, modification time, last access time, and expiration
time of each password stored. Files can be attached and stored with a password record, or text
notes can be entered with the password details. Each password record can also have an
associated icon.
Page 24
Page 25
Page 26
Page 27
Comodo Internet Security (CIS), developed by Comodo Group, is an Internet security suite
for Microsoft Windows. It includes an antivirus program, a personal firewall, a sandbox and
a host-based intrusion prevention system (HIPS) called Defense+.
Comodo Internet Security (CIS) is available in three editions: Complete, Pro and a core free
edition. The core edition is free and contains all security features of Pro. The Pro edition adds
technical support. The Complete edition complements the feature set with encryption of
transmitted data over the Internet connections and online storage for backup.
How does a firewall work?
At their most basic, firewalls work like a filter between your computer/network and the Internet.
You can program what you want to get out and what you want to get in. Everything else is not
allowed. There are several different methods firewalls use to filter out information, and some are
Department of CSE, SIT, Mangaluru
Page 28
Large corporations often have very complex firewalls in place to protect their extensive
networks.
On the outbound side, firewalls can be configured to prevent employees from sending
certain types of emails or transmitting sensitive data outside of the network.
On the inbound side, firewalls can be programmed to prevent access to certain websites
(like social networking sites).
Additionally, firewalls can prevent outside computers from accessing computers inside
the network.
A company might choose to designate a single computer on the network for file sharing
and all other computers could be restricted.
There is no limit to the variety of configurations that are possible when using firewalls.
The main goal of a personal firewall is to protect your personal computer and private
network from malicious mischief.
Page 29
Malware, malicious software, is the primary threat to your home computer. Viruses are
often the first type of malware that comes to mind. A virus can be transmitted to your computer
through email or over the Internet and can quickly cause a lot of damage to your files. Other
malware includes Trojan horse programs and spyware.
These malicious programs are usually designed to acquire your personal information for
the purposes of identity theft of some kind.
There are two ways a Firewall can prevent this from happening.
It can allow all traffic to pass through except data that meets a predetermined set of
criteria, or it can prohibit all traffic unless it meets a predetermined set of criteria.
Comodo Firewall
Comodo Firewall uses the latter way to prevent malware from installing on your computer. This
free software firewall, from a leading global security solutions provider and certification
authority, use the patent pending "Clean PC Mode" to prohibit any applications from being
installed on your computer unless it meets one of two criteria.
Those criteria are
a) the user gives permission for the installation and
b) the application is on an extensive list of approved applications provided by Comodo. With
this feature, you don't have to worry about unauthorized programs installing on your computer
without your knowledge.
Features of Comodo Firewall
Comodo Firewall is rated as a top firewall recommended for both beginners and
advanced users. It has a number of unique features including
Page 30
Personalized alerts
Page 31
Page 32