Professional Documents
Culture Documents
E SIXTH SEMESTER
RECORD FOR
SE
-C
ET
C
NAME:…….…..............................................……………………
U
REG NO:….………………………………….…………………
SE
LABORATORY RECORD NOTE BOOK
2016-2017
-C
This is to certify that this is a bonafide record of the work done by
Mr./Ms./Mrs…………………………………………………………………...,
ET
OBJECTIVES:
LIST OF EXPERIMENTS:
• Caesar Cipher
• Playfair Cipher
SE
• Hill Cipher
• Vigenere Cipher
-C
• Rail fence - row & Column Transformation
• DES
• RSA Algorithm
C
• Diffiee-Hellman
U
• MD5
• SHA-1
6. Demonstrate how to provide secure data storage, secure data transmission and for
7. Setup a honey pot and monitor the honey pot on network (KF Sensor)
9. Perform wireless audit on an access point or a router and decrypt WEP and WPA. (Net
3
Page
Stumbler)
OUTCOMES:
SOFTWARE:
HARDWARE:
SE
(or)
4
Page
6 2(a) DES
SE
7 2(b) RSA ALGORITHM
8 2(c) DIFFIEE-HELLMAN
-C
9 3) MD5
ET
10 4) SHA-1
C
12 6) GnuPG
13 7) HONEYPOT
14 8) ROOT KITS
Date:
AIM:
To implement a program for encrypting a plain text and decrypting a cipher text using Caesar Cipher
(shift cipher) substitution technique.
ALGORITHM DESCRIPTION:
• It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some
fixed number of positions down the alphabet. For example, with a left shift of 3, D would be
SE
replaced by A, E would become B, and so on.
• The method is named after Julius Caesar, who used it in his private correspondence.
-C
• The transformation can be represented by aligning two alphabets; the cipher alphabet is
the plain alphabet rotated left or right by some number of positions.
ET
• The encryption can also be represented using modular arithmetic by first transforming the
letters into numbers, according to the scheme, A = 0, B = 1, Z = 25.
C
En(x) = (x + n) mod26
• Decryption is performed similarly,
Dn (x)=(x - n) mod26
6
Page
import java.util.*;
class caesarCipher
if (Character.isLetter(i))
SE
-C
{
if (Character.isUpperCase(i))
ET
}
U
else
else
encoded.append(i);
}
7
return encoded.toString();
Page
SE
System.out.println(caesarCipher.encode(msg, 12));
-C
System.out.printf( "decoded message : ");
}
C
U
8
Page
stdout:
abcdefghijklmnopqrstuvwxyz
SE
-C
ET
C
U
RESULT:
Date:
AIM:
To implement a program to encrypt a plain text and decrypt a cipher text using play fair Cipher
substitution technique.
ALGORITHM DESCRIPTION:
•
space).
SE
The key can be written in the top rows of the table, from left to right, or in some
-C
otherpattern, such as a spiral beginning in the upper-left-hand corner and ending in the
center.
ET
• The keyword together with the conventions for filling in the 5 by 5 table constitutes the cipher
key. To encrypt a message, one would break the message into diagrams (groups of 2
C
letters) such that, for example, "HelloWorld" becomes "HE LL OW OR LD", and map
U
them out on the key table. Then apply the following 4 rules, to each pair of letters in the
plaintext:
• If both letters are the same (or only one letter is left), add an "X" after the first letter. Encrypt the
new pair and continue. Some variants of Playfair use "Q" instead of "X", but any letter, itself
uncommon as a repeated pair, will do.
• If the letters appear on the same row of your table, replace them with the letters to their
immediate right respectively (wrapping around to the left side of the row if a letter in the original
pair was on the right side of the row).
• If the letters appear on the same column of your table, replace them with the letters immediately
below respectively (wrapping around to the top side of the column if a letter in the original pair
was on the bottom side of the column).
10
Page
SE
-C
ET
C
U
11
Page
import java.awt.Point;
import java.util.*;
class playfairCipher
{
private static char[][] charTable;
{
s = s.toUpperCase().replaceAll("[^A-Z]", "");
SE
}
char c = s.charAt(i);
if (positions[c - 'A'] == null)
{
charTable[k / 5][k % 5] = c;
}
}
12
}
Page
{
char a = txt.charAt(i);
{
SE
-C
col1 = (col1 + dir) % 5;
{
U
}
else
{
int tmp = col1;
col1 = col2;
col2 = tmp;
}
txt.setCharAt(i, charTable[row1][col1]);
13
txt.setCharAt(i + 1, charTable[row2][col2]);
Page
}
R.Manikandan- AP - CSE - UCET
return txt.toString();
}
{
if (i == sb.length() - 1)
{
sb.append(sb.length() % 2 == 1 ? 'X' : "");
}
else if (sb.charAt(i) == sb.charAt(i + 1))
{
SE
-C
sb.insert(i + 1, 'X');
}}
return codec(sb, 1);
ET
}
C
{
return codec(new StringBuilder(s), 4);
}
public static void main (String[] args) throws java.lang.Exception
{
String key = "mysecretkey";
String txt = "CRYPTOLABS"; /* make sure string length is even */ /*
change J to I */
boolean chgJtoI = true;
createTbl(key, chgJtoI);
14
stdin:
stdout:
SE
input message : CRYPTOLABS
RESULT:
Date:
AIM:
To implement a program to encrypt and decrypt using the Hill cipher substitution technique
ALGORITHM DESCRIPTION:
SE
• encryption. The matrix used for encryption is the cipher key, and it should be chosen
• randomly from the set of invertible n × n matrices (modulo 26).
-C
• The cipher can, be adapted to an alphabet with any number of letters.
• All arithmetic just needs to be done modulo the number of letters instead of modulo 26.
ET
C
U
16
Page
class hillCipher
{
{ { 1, 2, 1 }, { 2, 3, 2 }, { 2, 2, 1 } };
/* key inverse matrix */
{
SE
-C
String ret = "";
int x,y, z;
int posa = (int)a - 65;
ET
b = key.charAt(y%26);
c = key.charAt(z%26);
ret = "" + a + b + c;
return ret;
}
{
Page
+ a + b + c;
return ret;
}
SE
-C
public static void main (String[] args) throws java.lang.Exception
{
String msg;
ET
int n;
msg = ("SecurityLaboratory");
msg = msg.toUpperCase();
msg = msg.replaceAll("\\ s", ""); /* remove spaces */ n =
msg.length() % 3;
{
18
{
R.Manikandan- AP - CSE - UCET
msg+= 'X';
}
}
System.out.println("padded message : " + msg);
{
enc += encode(pdchars[i], pdchars[i+1], pdchars[i+2]);
}
System.out.println("encoded message : " + enc);
{
SE
-C
dec += decode(dechars[i], dechars[i+1], dechars[i+2]);
}
System.out.println("decoded message : " + dec);
ET
}
C
}
U
Result:
stdin:
Standard input is empty
stdout:
simulation of Hill Cipher
SE
-C
ET
C
U
RESULT:
20
AIM:
To implement a program for encryption and decryption using vigenere cipher substitution
technique.
ALGORITHM DESCRIPTION:
SE
• It consists of the alphabet written out 26 times in different rows, each alphabet shifted
cyclically to the left compared to the previous alphabet, corresponding to the 26 possible
-C
Caesar ciphers.
• At different points in the encryption process, the cipher uses a different alphabet
ET
21
Page
class vigenereCipher
{
char c = text.charAt(i);
if (c < 'A' || c > 'Z')
{
SE
-C
continue;
}
res += (char)((c + key.charAt(j) - 2 * 'A') % 26 + 'A');
ET
j = ++j % key.length();
C
}
U
return res;
}
char c = text.charAt(i);
if (c < 'A' || c > 'Z')
{
22
continue;
Page
}
R.Manikandan- AP - CSE - UCET
res += (char)((c - key.charAt(j) + 26) % 26 + 'A');
j = ++j % key.length();
}
return res;
}
public static void main (String[] args) throws java.lang.Exception
{
String key = "VIGENERECIPHER";
}
}
ET
C
U
Output:
stdin:
stdout:
RESULT:
Date:
AIM:
To implement a program for encryption and decryption using rail fence transposition technique.
ALGORITHM DESCRIPTION:
• In the rail fence cipher, the plaintext is written downwards and diagonally on successive
"rails" of an imaginary fence, then moving up when we reach the bottom rail.
• When we reach the top rail, the message is written downwards again until the whole
plaintext is written out.
SE
• The message is then read off in rows.
-C
ET
C
U
25
Page
import java.util.*;
class railfenceCipherHelper
{
int depth;
String encode(String msg, int depth) throws Exception
{
int r = depth;
int l = msg.length();
int c = l/depth;
SE
int k = 0;
char mat[][] = new char[r][c];
-C
String enc = "";
for (int i=0; i<c; i++)
ET
{
for (int j=0; j<r; j++)
C
{
U
if (k != l)
{
mat[j][i] = msg.charAt(k++);
}
else
{
mat[j][i] = 'X';
}
}
26
}
Page
{
enc += mat[i][j];
}
}
return enc;
}
int r = depth;
int l = encmsg.length();
int c = l/depth;
SE
-C
int k = 0;
{
U
mat[i][j] = encmsg.charAt(k++);
}
}
for (int i=0; i<c; i++)
{
dec += mat[j][i];
27
}
Page
}
R.Manikandan- AP - CSE - UCET
return dec;
}
}
class railfenceCipher
{
public static void main (String[] args) throws java.lang.Exception
{
railfenceCipherHelper rf = new railfenceCipherHelper();
int depth = 2;
enc = rf.encode(msg, depth);
}
U
28
Page
stdin:
stdout:
SE
-C
ET
C
U
RESULT:
Date:
AIM:
To develop a program to implement Data Encryption Standard for encryption and decryption.
ALGORITHM DESCRIPTION:
• The Data Encryption Standard (DES) is a symmetric-key block cipher published by the
National Institute of Standards and Technology (NIST).
• DES is an implementation of a Feistel Cipher. It uses 16 round Feistel structure. The block
size is 64-bit.
SE
• Though, key length is 64-bit, DES has an effective key length of 56 bits, since 8 of the 64
bits of the key are not used by the encryption algorithm (function as check bits only).
-C
• General Structure of DES is depicted in the following illustration
ET
C
U
30
Page
31
Page
import javax.swing.*;
import java.security.SecureRandom;
import javax.crypto.Cipher;
import javax.crypto.KeyGenerator;
import javax.crypto.SecretKey;
import javax.crypto.spec.SecretKeySpec;
import java.util.Random ;
SE
class DES {
String inputMessage,encryptedData,decryptedMessage;
C
U
public DES() {
try {
generateSymmetricKey();
catch(Exception e) {
System.out.println(e);
SE
void generateSymmetricKey() {
try {
-C
Random r = new Random();
ET
intnum = r.nextInt(10000);
skey=getRawKey(knumb);
catch(Exception e) {
System.out.println(e);
}}
33
SecureRandomsr = SecureRandom.getInstance("SHA1PRNG");
sr.setSeed(seed);
kgen.init(56, sr);
SecretKeyskey = kgen.generateKey();
raw = skey.getEncoded();
return raw;
SE
SecretKeySpecskeySpec = new SecretKeySpec(raw, "DES");
return encrypted;
C
U
cipher.init(Cipher.DECRYPT_MODE, skeySpec);
return decrypted;
}
34
OUTPUT:
SE
-C
ET
C
U
35
Page
36
Page
37
Page
Date:
AIM:
Develop a program to implement RSA algorithm for encryption and decryption. This
cryptosystem is one the initial system. It remains most employed cryptosystem even today. he system
was invented by three scholars Ron Rivest, Adi Shamir, and Len Adleman and hence, it is termed as
RSA cryptosystem. The two aspects of the RSA cryptosystem, firstly generation of key pair and
secondly encryption-decryption algorithms.
ALGORITHM DESCRIPTION:
SE
Generation of RSA Key Pair
• Each person or a party who desires to participate in communication using encryption needs to
-C
generate a pair of keys, namely public key and private key.
• The process followed in the generation of keys is described below −
• Generate the RSA modulus (n)
ET
number d.
Page
SE
-C
ET
C
U
39
Page
import java.math.BigInteger;
import java.util.Random;
import java.io.*;
class rsaAlg
{
private BigInteger p, q, n, phi, e, d; /* public key components */
{
C
str += Byte.toString(b);
U
}
return str;
}
/* encrypt message */
}
/* decrypt message */
{
Page
public rsaAlg()
{
q = BigInteger.probablePrime(bitLen, rand);
n = p.multiply(q);
phi = p.subtract(BigInteger.ONE).multiply(q.subtract(BigInteger.ONE)); e =
BigInteger.probablePrime(bitLen/2, rand);
{
SE
-C
e.add(BigInteger.ONE);
}
d = e.modInverse(phi);
ET
}
C
{
this.e = e;
this.d = d;
this.n = n;
}
public static void main (String[] args) throws java.lang.Exception
{
Output:
stdin:
message(bytes) :
U
721011081081113211911111410810033328310199117114105116121327697981111149711611
1114121
ciphertext(bytes) : 0-119-42-9610376-981195-8810516-1281042-9-38-23-74856644-2510705766-94-
2310310452-2674-46125-13561120-2616122-111-507-117-5621-962-57-127-9-93-537810108-
50355612715733-31-10510732-106-6050-8666-2612570113357436822-46-7169-402411558-42-11141-
50-872210997-61-84-2627-84-36-55-56-1255440196847-60-625450-19-35123-901541-126-109-7-
5300-117618634-51-67-90-113121-88-10234124-61198-24-26741167-568553-43-38873646-1105-21-
77-1116358-120-47-98-1-110-97-31-125-113108-91-998312234-27-29-11278-6011241-9944-6676-20-
9225-12796-48-52-75-117-27-884-815-648511153383676-158-116-8573120-87-4467104-9784108111-
54830-61-90-38-11223-119-4210510-18-20-4090-85-104-8561-120-49-12-120108-23-48-4945-102
42
Page
721011081081113211911111410810033328310199117114105116121327697981111149711611
1114121
SE
-C
ET
C
U
RESULT:
43
Date:
AIM:
ALGORITHM DESCRIPTION:
SE
cryptographic keys over a public channel and was one of the first public-key protocols. T
he Diffie-Hellman key exchange method allows two parties that have no prior knowledge
-C
of each other to jointly establish a shared secret key over an insecure channel.
ET
This key can then be used to encrypt subsequent communications using a symmetric key
cipher.
C
U
ALGORITHM
XA
mod q
XB
mod q
(YB)
XA
mod q
SE
-C
ET
C
U
45
Page
import java.util.*;
class diffieHellmanAlg
SE
int x = 9; /* only Alice knows this secret */
else
SE
-C
ET
C
U
47
Page
stdin:
stdout:
aliceSends : 6.0
SE
bobComputes : 9.0
bobSends : 5.0
-C
aliceComputes : 9.0
ET
sharedSecret : 9.0
48
Page
RESULT:
Date:
AIM:
ALGORITHM DESCRIPTION:
SE
• MD5 has been utilized in a wide variety of cryptographic
• commonly used to verify data integrity
-C
ET
C
U
50
Page
import java.util.*;
class md5Alg
SE
private static final int INIT_D = 0x10325476;
9, 14, 20,
6, 10, 15, 21 };
static
}
Page
SE
pre-processing with padding */
padB[0] = (byte)0x80;
-C
for (int i = 0; i < 8; i++)
ET
padB[padB.length - 8 + i] = (byte)msgLenBits;
C
U
msgLenBits >>>= 8;
int a = INIT_A;
int b = INIT_B;
int c = INIT_C;
int d = INIT_D;
{
Page
int origA = a;
int origB = b;
SE
int origC = c;
int origD = d;
-C
for (int j = 0; j < 64; j++)
ET
int f = 0;
switch (div16)
case 0:
break;
53
}
Page
break;
case 2:
f = b ^ c ^ d;
SE
bufIdx = (bufIdx * 3 + 5) & 0x0F;
break;
-C
}
ET
case 3:
{
C
U
f = c ^ (b | ~d);
break;
/* left rotate */
a = d;
Page
c = b;
b = temp;
a += origA;
b += origB;
c += origC;
d += origD;
SE
}
{
C
U
md5[cnt++] = (byte)n;
n >>>= 8;
return md5;
55
}
Page
return sb.toString();
SE
public static void main (String[] args) throws java.lang.Exception
{
-C
String msg = "hello world";
ET
56
Page
stdin:
SE
Standard input is empty
stdout:
-C
simulation of MD5 algorithm
ET
57
Page
RESULT:
C
58
Page
Date:
AIM:
ALGORITHM DESCRIPTION:
SE
message length to 64 bits less than an even multiple of 512.
H0 = 0x67452301
H1 = 0xEFCDAB89
H2 = 0x98BADCFE
H3 = 0x10325476
H4 = 0xC3D2E1F0
SE
Step 6: Processing Message in 512-bit blocks (L blocks in total message)….
This is the main task of SHA1 algorithm which loops through the padded and
-C
appended message in 512-bit blocks.
ET
Input and predefined functions: M[1, 2, ..., L]: Blocks of the padded and appended message
H0, H1, H2, H3, H4, H5: 5 Word buffers with initial values
• For loop on k = 1 to L
For t = 16 to 79 do:
For t = 0 to 79 do:
H0 = H0 + A, H1 = H1 + B, H2 = H2 + C,
Output:
H0, H1, H2, H3, H4, H5: Word buffers with final message digest
SE
-C
ET
C
U
61
Page
import java.security.*;
try {
MessageDigest md = MessageDigest.getInstance("SHA1");
SE
System.out.println(" Provider = " +md.getProvider());
md.update(input.getBytes());
System.out.println();
input = "abc";
md.update(input.getBytes());
output = md.digest();
System.out.println();
md.update(input.getBytes());
Page
System.out.println();
System.out.println(""); }
catch (Exception e) {
SE
char hexDigit[] = {'0', '1', '2', '3', '4', '5', '6', '7', '8', '9', 'A', 'B', 'C', 'D', 'E', 'F'};
return buf.toString(); }
63
Page
Algorithm = SHA1
SHA1("") = DA39A3EE5E6B4B0D3255BFEF95601890AFD80709
SE
SHA1("abc") = A9993E364706816ABA3E25717850C26C9CD0D89D
SHA1("abcdefghijklmnopqrstuvwxyz") =
-C
32D10C7B8CF96570CA04CE37F2A19D84240D3A89
ET
C
U
64
Page
RESULT:
Date:
AIM:
PROGRAM :
import java.util.*;
import java.math.BigInteger;
SE
class dsaAlg
{
-C
final static BigInteger one = new BigInteger("1");
ET
while (!test.isProbablePrime(99))
test = test.add(one);
return test;
66
}
Page
while (!n.isProbablePrime(99))
while (!((n.mod(start)).equals(zero)))
start = start.add(one);
SE
}
n = n.divide(start);
-C
}
ET
return n;
}
C
U
BigInteger q,
Random r)
h = h.mod(p);
}
Page
BigInteger q = findQ(p.subtract(one));
BigInteger g = getGen(p,q,randObj);
SE
System.out.println("global public key components are:");
x.mod(q);
BigInteger y = g.modPow(x,p);
k.mod(q);
BigInteger r = (g.modPow(k,p)).mod(q);
Page
BigInteger s = kInv.multiply(hashVal.add(x.multiply(r))); s =
s.mod(q);
/* secret information */
SE
System.out.println("h (rndhash) is: " + hashVal);
BigInteger w = s.modInverse(q);
BigInteger u1 = (hashVal.multiply(w)).mod(q);
BigInteger u2 = (r.multiply(w)).mod(q);
BigInteger v = (g.modPow(u1,p)).multiply(y.modPow(u2,p)); v =
(v.mod(p)).mod(q);
if (v.equals(r))
else
SE
}
}
-C
ET
Output:
stdin:
C
U
stdout:
p is: 10601
q is: 53
g is: 3848
x (private) is: 48
Page
r is : 4
s is : 16
w is : 10
u1 is : 13
SE
u2 is : 40
v is : 4
-C
success: digital signature is verified! 4
ET
C
U
Result:
71
Date:
Aim:
Demonstrate how to provide secure data storage, secure data transmission and for creating
digital signatures (gnupg).
Procedure:
SE
Just like I said above, we’ll be using GPG4Win. If you’re curious, you can view the source code for
-C
it here.
1. Head on over to https://gpg4win.org/download.html. We want the full version, so click ‘Gpg4win
ET
C
U
2.2.3’
2. Save it, open it when it’s done downloading. If you have UAC enabled, click ‘Yes’ on the window
that appears Choose your language, click ‘Ok’ 72
Page
SE
-C
ET
C
U
4. It will ask where to install, just keep the default and click ‘Next’
5. Now it’ll ask where you want to install shortcuts. Select whichever you want, click ‘Next’
73
6. You can choose which Start Menu folder you want it installed in, just click ‘Next’
Page
SE
-C
Now you have the tools you need to get started with PGP
The next step is to generate your keypair so you can encrypt/decrypt messages. Like always, we’ll be
C
74
Page
SE
-C
3. The Certificate Creation Wizard should pop up, click on ‘Create a personal OpenPGP key pair’
ET
C
U
4. Now you’ll enter your details. Use your marketplace username as ‘Name’, and fill out the rest with
whatever you want. You don’t need to use a real email. Check the picture for an example on how it
75
should look
Page
76
Page
SE
-C
6. Confirm you filled out all of your info correctly, then click ‘Create Key’
C
U
77
Page
8. It will now generate your key. It will need you to do random things to create entropy. Mash keys,
wiggle the mouse, watch porn, download torrents, whatever
SE
-C
ET
C
U
78
Page
SE
-C
ET
Now we need to get your public key, without it vendors wont be able to send you secure messages.
U
79
Page
SE
-C
ET
2. Browse where you want to save, give it a name, then click ‘Save’
C
U
80
Page
SE
-C
ET
C
U
81
Page
SE
-C
ET
C
Remember to add your public key to your market profile so people can message you easier!
U
82
Page
SE
-C
ET
2. Select where you want it saved, give it a name, check ‘ASCII armor’, and click ‘Ok’
C
U
83
It’s impossible to send a vendor an encrypted message without their public key.
1. Find a public key you want to import
2. Copy everything from ‘—–BEGIN PGP PUBLIC KEY BLOCK—–‘ to ‘—–END PGP PUBLIC
KEY BLOCK—‘, see the picture for an example
SE
-C
ET
3. In your task bar, right click on the Kleopatra icon, go to ‘Clipboard’, then click ‘Certificate Import’
C
U
85
Page
SE
-C
ET
3. It will import your private key, and pop up a window to confirm. Click ‘Ok’
C
U
86
Page
SE
Part 7 – Encrypting a message
Now that we’re ready to go, lets go ahead and send a message.
-C
1. Open up your text editor of choice
ET
C
U
87
Page
SE
-C
3. In your task bar, right click on the Kleopatra icon, go to ‘Clipboard’, then click ‘Encrypt…’
ET
C
U
88
Page
SE
-C
ET
C
5. Another window will appear. Click the ‘Other Certificates’ tab, then select who you want to send
U
89
Page
SE
-C
ET
C
U
90
Page
SE
-C
ET
C
8. Your encrypted message will be in your clipboard, all you need to do is paste it into the message box
U
and send
91
2. In your task bar, right click on the Kleopatra icon, go to ‘Clipboard’, then click ‘Decrypt/Verify…’
SE
-C
ET
C
3. A window will pop up asking for your passphrase, enter that then click ‘Ok’
U
4. A window should pop up verifying it was decrypted, and copied to your clipboard. Click ‘Finish’
92
Page
SE
-C
ET
Part 9 – Conclusion
C
I’m hoping this was in depth enough for you Windows users out there. PGP can seem complicated at
first, but with an hour or two of your time you can see it’s actually pretty simple. There’s obviously
U
more behind it, and different tools that can be used, but we might save that for another time. Stay safe
everyone! Encrypt all messages!
RESULT:
93
SETUP A HONEY POT AND MONITOR THE HONEY POT ON NETWORK (KF SENSOR)
Date:
AIM:
Download and install a KF sensor tool and study how create honey pot and monitor the honey pot on the
network.
PROCEDURE DESCRIPTION:
SE
Honey Pot is a device placed on Computer Network specifically designed to capture malicious network
traffic. KF Sensor is the tool to setup as honey pot when KF Sensor is running it places a siren icon in
-C
the windows system tray in the bottom right of the screen. If there are no alerts then green icon is
displayed.
ET
3.Then restart your pc. Configure properly no change needs to do now go to setting option and
U
5.You will get some logs about clients. And it will start working
KFSensor
SE
• Interprets all the data and alerts captured by server in graphical form.
• Using it you can configure the KF Sensor Server and monitor the events generated by the KF
-C
Sensor Server.
Sim Server
ET
RESULT:
Date:
AIM:
Rootkit is a stealth type of malicious software designed to hide the existence of certain process from
normal methods of detection and enables continued privileged access to a computer.
DESCRIPTION :
• Root kit is a stealth type of malicious software designed to hide the existence of certain
SE
process from normal methods of detection and enables continued privileged access to a
computer.
•
-C
Download Rootkit Tool from GMER website. www.gmer.net
ET
C
U
97
Page
SE
-C
ET
C
U
• Select Processes menu and kill any unwanted process if any. Modules menu displays the
various system files like .sys, .dll
• Services menu displays the complete services running with Autostart, Enable,
98
Disable,System, Boot.
•
Page
SE
-C
ET
C
U
99
Page
100
Page
RESULT:
Thus the program was executed and verified successfully.
101
Page
Date:
AIM:
To Perform Wireless Audit On An Access Point Or A Router And Decrypt Wep And Wpa.
PROCEDURE:
SE
NetStumbler (Network Stumbler) is one of the Wi-Fi hacking tool which only compatible with
windows, this tool also a freeware. With this program, we can search for wireless network which
-C
open and infiltrate the network. Its having some compatibility and network adapter issues.
2. It is highly recommended that your PC should have wireless network card in order to access
wireless router.
C
Strong, YELLOW and other color indicates a weaker signal, RED indicates a very weak and
GREY indicates a signal loss.
5. Lock symbol with GREEN bubble indicates the Access point has encryption enabled.
6. MAC assigned to Wireless Access Point is displayed on right hand pane.
7. The next coloumn displays the Access points Service Set Identifier[SSID] which is useful to
crack the password.
8. To decrypt use WireShark tool by selecting Edit preferences IEEE 802.11
9. Enter the WEP keys as a string of hexadecimal numbers as A1B2C3D4E5
102
Page
103
Page
https://www.wireshark.org/download.html
If you are using the Windows version of Wireshark and you have an AirPcap adapter you can add
decryption keys using the wireless toolbar. If the toolbar isn't visible, you can show it by selecting
View->Wireless Toolbar. Click on the Decryption Keys... button on the toolbar:
This will open the decryption key management window. As shown in the window you can select
between three decryption modes: None, Wireshark, and Driver:
SE
-C
ET
C
U
RESULT:
104
Date:
AIM:
To demonstrate intrusion detection system (ids) using any tool (snort or any other s/w)
PROCEDURE:
SE
1. Sniffer mode 2. Packet Logger mode 3. Network Intrusion Detection System mode
2. Packet Logger mode snort –dev –l c:\log [create this directory in the C drive] and snort will
ET
snort –dev –l c:\log –h ipaddress/24 This rule tells snort that you want to print out the data link
and TCP/IP headers as well as application data into the log
directory.
snort –l c:\log –b This is binary mode logs everything into a single file
SE
-C
ET
C
U
106
Page
RESULT: