0% found this document useful (0 votes)
467 views1 page

Information Security Lab

The document is a lab manual for 2025 focused on Linux commands, Wireshark, and Nmap tasks. It outlines specific tasks to perform, including checking IP addresses, editing text files, system information retrieval, directory management, and network security analysis. Each section requires practical execution and screenshot documentation for assessment.

Uploaded by

Muhammad Shakeel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
467 views1 page

Information Security Lab

The document is a lab manual for 2025 focused on Linux commands, Wireshark, and Nmap tasks. It outlines specific tasks to perform, including checking IP addresses, editing text files, system information retrieval, directory management, and network security analysis. Each section requires practical execution and screenshot documentation for assessment.

Uploaded by

Muhammad Shakeel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

LAB MANUAL 2025 (ADPCS-3)

Linux Commands

Write the command for the following tasks (attach their screenshots also). (Marks 14)
1. Check your PC IP address and Gateway
2. How can you edit content in a (Linux OS) terminal and see the
output of a Txt file?
3. By using which commands can I get my system information?
4. Make a new directory. How can you see and change the current directory?
5. Make a folder by using Linux commands, move/copy some Txt file in it.
6. Solve the first 2 tasks from PicoCTF (4 marks)

Wireshark (Marks 8)
Perform all these Tasks practically and attach their screenshots.

1. Identify any MAC or IP addresses not belonging to known devices. How can you mitigate
unauthorized access?
2. What sensitive information (e.g., username/password) can you extract from unencrypted FTP
traffic?

Nmap

Write the command and attach their screenshots for the following tasks.
(Marks 8)
1. How would you find live hosts in the subnet 192.168.1.0/24
without checking their ports?
2. What command would you use to detect a full scan against some website or IP address?

You might also like