You are on page 1of 36

SSH Key Management

• Objective:
 An exceptional system convention utilizing open key cryptography to empower approved
clients to distantly get to a PC or other gadget by means of access accreditation called SSH
keys
Configuration
Screenshots
Screenshots
Screenshots
Intrusion Detection System (IDS)

• Objective:
Arranges traffic in networks for dubious action and known dangers, sending
up alarms when it finds such things
A long-lasting corporate digital security staple, interruption location as a
capacity stays basic in the advanced endeavor
Configuration
Screenshots
Screenshots
Compile and Install

• Configuration:
• Configuration:
Screenshots
Screenshots
Screenshots
Obstacles

The libcaca.build and toiled build didn’t load at first.


Then after applying Chmod permission it worked.
Regex

• Regular Expressions with MultiTail


Regex

• Regular Expressions with MultiTail


Regex

• Regular Expressions with MultiTail


• Evaluation of txt2regex
Screenshots
Protocol Analysis

• Objective:
To apply tcpflow for capturing data transmission back and forth from
webserver and the browser:
To get to the default monkey site page.

To get to the mailbox in squirrelmail.


Configuration
Screenshots
Screenshots
How can you recover images or other content using a
packet sniffer like this?
• We can easily recover images or other contents by decrypting the PACP file that
the packer sniffer creates while sniffing the data.
Migrate to Net-R

• Configuration:
Screenshots
Screenshots
Describe the Net-R automatic traffic generation system
• When the network has two hosts, it will communicate with each other. If the
system is booted the user automatically logs in. By typing Alt +F8 we can see the
logs. When the host joins the network, it added to the network automatically. It
take a fairly short time for DHCP to give an ip from its ip-lease.
Port Knock

• Objective:
• Through port knock we can secure a server by closing firewall port. Port
knock allows to give assess to other without opening firewall to the internet
which make our network secure.
• It make sure to block the incoming connections and ports can be open w
automatically when prearrangement pattern of connection attempts is made
(Mackay, 2019)
Configuration
Screenshots
Ettercap

• Objective:
• Helps in security auditing and network protocol analysis and work as man in
the middle attacks on LAN
• Puts the network interface into promiscuous mode and by ARP poisoning the
target machines
Configuration
Configuration
Screenshots
Screenshots

You might also like