Professional Documents
Culture Documents
Description:
Code:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
2)
Result:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
Hill Cipher
Description:
Code:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
2)
Play Fair Cipher
Description:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
Code:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
2)
Result:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
Description:
Code:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
1)
2)
Result:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
Description:
Code:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
2)
Result:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
Description:
Code:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
2)
Result:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
Description:
Code:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
1)
2)
Result:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
Description:
Code:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
1)
2)
Result:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
MD5
Description:
Code:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
1)
2)
Description:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
Code:
2)
Result:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
Task 9:
Demonstrate TCP Three Way Handshake and HTTP Password Sniffing using
Wireshark.
Analyze ICMP packets using TCP Dump
Steps:
1. Install Wireshark on your computer and launch it.
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
3. Open a web browser and enter a website's address in the URL bar, for example,
www.google.com.
4. You will see a series of packets being captured by Wireshark. Look for the SYN
packet sent by your computer to the destination website's IP address. The SYN
packet is the first packet of the TCP Three Way Handshake.
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
5. Once you find the SYN packet, select it and right-click on it. Then, select
"Follow" and choose "TCP Stream" from the dropdown menu.
6. A new window will open showing the TCP stream between your computer and the
website. Select the SYN packet sent by your computer in this window.
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
7. Next, find and select the SYN-ACK packet sent by the destination website to your
computer. This packet is the second packet of the TCP Three Way Handshake.
8. Finally, find and select the ACK packet sent by your computer to the destination
website. This packet is the third and final packet of the TCP Three Way
Handshake.
Result: Demonstration of TCP Three Way Handshake using Wireshark is successful.
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
Steps:
1. Open Wireshark and start a new capture by clicking on the "Capture" button.
2. Select the network interface that you want to use for the capture, and click on the
"Start" button to begin capturing network traffic.
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
3. Open a web browser and go to a website that requires a username and password
to log in.
4. Enter
a
username and password and click on the "Login" button to submit the credentials.
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
7. Look for the packets that contain the username and password information. You
can do this by looking for packets that have a "POST" or "GET" request,
followed by a "Credentials" or "Authentication" field.
8. Analyze the packet containing the username and password information to extract
the plaintext password.
9. (OR) Right click on the selected packet and follow the “HTTP Stream”. A
window appears describing all the attributes of the packet including username and
password.
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
Steps:
1. Open a terminal window on your computer and ping google.com
2. Type the following command to start tcpdump with the appropriate options to
capture.
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
Task 10: Perform a port scan (SYN, CONNECT, ACK, NULL, FIN, XMAS) on
scanme.nmap.org domain and identify what ports and services including OS detection and
output to normal and XML formats.
Procedure:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
SYN Scan
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
Connect() Scan
ACK Scan
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
NULL Scan
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
FIN Scan
XMAS Scan
VR20 A.Y. 2022-2023 CSE VRSEC III/IV B.Tech VI Sem
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
OS detection
Result: Perform a port scan (SYN, CONNECT, ACK, NULL, FIN, XMAS)
and identify what ports and services including OS detection implemented
successfully.
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
Task 11: Create a new Linux user and Perform a Password less authentication for newly
created user and investigate how SSH works.
Procedure:
Step 1: Create a NatNetwork by clicking on the Create button in the Tools menu of
Oracle VM VirtualBox Manager.
Step 2: Configure the Network settings of both the VM’s (Kali Linux and Ubuntu) by
changing the network to NatNetwork as shown below.
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
Step 3: Start the VMs (Kali Linux and Ubuntu). Open the terminal and get the ip address
of both the VMs.
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
Step 7: Log into the Ubuntu VM by entering the password as shown below.
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
Step 10: Log in as the new user(test) via SSH by entering the password for the user
test.
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
Step 12: In Step 10, we have logged in as user test by entering password. To
perform passwordless authentication we need to generate an SSH key pair and copy
it in the target machine.
Now Generate the SSH key pair as shown below.
Step 13: Verify whether the key pair has been generated by checking the files
available in the .ssh directory.
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
Step 14: Copy the public key to the remote server(Ubuntu VM logged in as test).
Step 15: Now try to login as user test via SSH. You can observe that without
authenticating with password you can directly login to the remote server(Ubuntu
VM logged in as test).
Result: The task to create a new Linux user and perform a Password less
authentication for newly created user implemented successfully.
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
Procedure:
Here we are gathering the information about Amazon.com website using the following
tools:
a) archive.org
Archive.org is a non-profit digital library that aims to provide universal access to
knowledge and historical records, including books, web pages, videos, audio recordings,
and software programs. It is a digital archive that collects and preserves information from
the internet and other sources for future generations.
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
b) whois
Whois.com is a website that provides information on domain name registrations. It allows
users to look up information about domain names, including the owner of the domain, the
date of registration, the expiration date, and the domain registrar.
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
c) netcraft
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
Netcraft is a website that provides internet security services and research data to help
individuals and organizations protect themselves online.
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
Search engine:
By searching a specific website in a search engine, we can navigate to the desired links for
information.(Example: Searching for amazon)
Search operators:
filetype: Finds files that only fall under a specific file type.
Here we have used type of file as pdf, site and searched for pdfs containing word video
game in amazon.com website.
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
inurl: Finds pages on a site that has the targeted search term in the URL.
Here we are searching for the pages containing the word footwear in the URL of
amazon website.
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
intitle: This is a narrower operator that can help us find more targeted results for
specific search phrases.
Here we are searching for pages with words amazon and products that include
trending in the top of the page.
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
site: refine search parameters to come from only the site/domain specified
Searches for information on Furniture on gathered by amazon website.
15
20CS6352 Cryptography and Network Security Laboratory Experiment No:
15