0% found this document useful (0 votes)
89 views3 pages

Devang Patel Institute of Advance Technology and Research: Practical List

The document provides a list of 10 practical assignments for an Information Security/Cryptography and Network Security course. The assignments include implementing encryption/decryption algorithms like Caesar cipher and RSA, cryptanalysis techniques like brute force and statistical attacks, network scanning and service identification using tools like Nmap, footprinting to gather target information using tools like Dmitry and Whatweb, packet sniffing and cryptanalysis using Wireshark and netsniff, finding web application vulnerabilities using OWASP-ZAP, and implementing steganography using tools like OpenPuff. Students are instructed to use programming skills and maintain soft copies of programs performed.

Uploaded by

Aaliya Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views3 pages

Devang Patel Institute of Advance Technology and Research: Practical List

The document provides a list of 10 practical assignments for an Information Security/Cryptography and Network Security course. The assignments include implementing encryption/decryption algorithms like Caesar cipher and RSA, cryptanalysis techniques like brute force and statistical attacks, network scanning and service identification using tools like Nmap, footprinting to gather target information using tools like Dmitry and Whatweb, packet sniffing and cryptanalysis using Wireshark and netsniff, finding web application vulnerabilities using OWASP-ZAP, and implementing steganography using tools like OpenPuff. Students are instructed to use programming skills and maintain soft copies of programs performed.

Uploaded by

Aaliya Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

Devang Patel Institute of Advance Technology and

Research
Subject Name: Information Security/Cryptography and Network Security
Semester: 6th (B.Tech)
Subject Code: CE348/CS345/IT345 Academic year: 2019-20

Practical List
Instructions:
I. Student should have knowledge of any one programming language to perform practical.
II. Student should maintain soft copy of all the programs performed during lab sessions.

Sr. Hrs LO PO PEO


Practical Aim
no.
1 Implement a program which can decrypt the original message from 04
the given cipher text without knowing the key for Caesar cipher.
For a generated cipher text of both the inputs, implement brute
force attack for Caesar cipher.
(i) Input- “CHARUSAT”
Key- 3
(ii) INPUT-“The vast majority of programmers do not work on
operating systems There is so much software around that no
human can comprehend more than a tiny fraction of it. How
come we can keep writing software without getting hopelessly
confused by its complexity How come the software written
nowadays does so much more than the software written 50
years ago There is an unlikely person who would know the
answer to that last question Isaac Newton He knew he saw far
because he stood on the shoulders of giants He may not know
what software is But he would probably guess that todays
software stands on the shoulders of yesterdays software and
thats how it does more In fact the whole edifice built by
programmers looks like a skyscraper reaching up at dizzying
heights because it is carefully built layer upon layer”
KEY- 23
2 Apply attacks for cryptanalysis to decrypt the original message from 02
a given cipher text using Play fair cipher.
Key = Your Name
3 Decrypt the original message from a chosen text using transposition 02

1
cipher.

Apply statistical attack, brute-force attack or pattern attack for


cryptanalysis.
4 Implement RSA algorithm. 02
5 Demonstrate how Diffie -Hellman key exchange works with Man-In- 02
The-Middle attack.
6 Port scanning involves connecting with TCP and UDP ports on a 02
system, once you have found the IP addresses of a target
organization by Footprinting technique. You have to map the
network of this organization. Nmap is a network mapper and a
power full, flexible, freely available and easy to use tool. It is
available for both Linux and Windows based operating system. Use
the given approach to implement Scanning and Enumeration
Techniques using Nmap.

7 a) Perform Port Scanning, File Transfer, Client-server chat and 02


Basic Webserver implementation using netcat.
b) Find the service running on the particular port using
netcat.
8 In computers, Footprinting is the process of accumulating data 04
regarding a specific network environment, usually for the purpose
of finding ways to intrude into the environment. Footprinting can
reveal system vulnerabilities and improve the ease with which they
can be exploited. Use the given approach to implement
Footprinting: Gathering Target Information making use of following
tools:
Dmitry – Deepmagic
Reference : https://www.youtube.com/watch?v=_zd3goGLM7Q
UA Tester
Reference : https://www.youtube.com/watch?v=WsTupi32ZYE
Whatweb
Reference : https://www.youtube.com/watch?v=Fx9sIgxcNwU
9 Use Wireshark and netsniff to perform Cryptanalytic attacks using packet 04
sniffing .

2
10 Using OWASP-ZAP tool to find out Web Application Vulnerability. 02

* Security Tools: Openvas, DVWA


* Attacking Web Application: SQL injection.
* The transmission of information need to be secure over the
communication channel
and the data has to be confidential. Study and implement the
practical approach for
Steganography.
-Using DOS commands
-Using OpenPuff Tool
Reference:
https://embeddedsw.net/OpenPuff_Steganography_Home.html

You might also like