Professional Documents
Culture Documents
• Objective:
An exceptional system convention utilizing open key cryptography to empower approved
clients to distantly get to a PC or other gadget by means of access accreditation called SSH
keys
Configuration
Screenshots
Screenshots
Screenshots
Intrusion Detection System (IDS)
• Objective:
Arranges traffic in networks for dubious action and known dangers, sending
up alarms when it finds such things
A long-lasting corporate digital security staple, interruption location as a
capacity stays basic in the advanced endeavor
Configuration
Screenshots
Screenshots
Compile and Install
• Configuration:
• Configuration:
Screenshots
Screenshots
Screenshots
Obstacles
• Objective:
To apply tcpflow for capturing data transmission back and forth from
webserver and the browser:
To get to the default monkey site page.
• Configuration:
Screenshots
Screenshots
Describe the Net-R automatic traffic generation system
• When the network has two hosts, it will communicate with each other. If the
system is booted the user automatically logs in. By typing Alt +F8 we can see the
logs. When the host joins the network, it added to the network automatically. It
take a fairly short time for DHCP to give an ip from its ip-lease.
Port Knock
• Objective:
• Through port knock we can secure a server by closing firewall port. Port
knock allows to give assess to other without opening firewall to the internet
which make our network secure.
• It make sure to block the incoming connections and ports can be open w
automatically when prearrangement pattern of connection attempts is made
(Mackay, 2019)
Configuration
Screenshots
Ettercap
• Objective:
• Helps in security auditing and network protocol analysis and work as man in
the middle attacks on LAN
• Puts the network interface into promiscuous mode and by ARP poisoning the
target machines
Configuration
Configuration
Screenshots
Screenshots