Lab Iii
Lab Iii
Lab-III (MCIT-206)
Experiment No: 1
Detect ARP spoofing using open source tool ARPWATCH
Objective: Objective of the module to find ARP spoofing using open source.
Sample Output
2
The above output displays new workstation. If any changes are made, you will get
following output.
You can also check current ARP table, by using following command.
#arp –a
Sample Output
If you want to send alerts to your custom email id, then open the main configuration
file‗/etc/sysconfig/arpwatch‗ and add the email as shown below.
Page 3
Here is an example of an email report, when a new MAC is connected on.
Conclusion:
Arpwatch is a software or program tool for monitoring Address
Resolution Protocol traffic on a computer network. Its main goal is to detect
arp poisoning attacks like (e.g. ARP Poisoning, Ettercap, and Netcut) also
4
detect intruders in your network by sending an email to an administrator
when new Ethernet MAC addresses seen on the network.
Page 5
MCIT201 (Information Security System )
Experiment No: 2
Download and install nmap. Use it with different options to scan open ports.
Aim: Download and install nmap. Use it with different options to scan open ports
Objective: objective of this module to learn nmap installation & use this to scan
different ports.
Theory:
Nmap (Network Mapper) is a security scanner originally written by Gordon Lyon
(also known by his pseudonym Fyodor Vaskovich) used to discover hosts and
services on a computer network, thus creating a "map" of the network. To
accomplish its goal, Nmap sends specially crafted packets to the target host and
then analyzes the responses. Unlike many simple port scanners that just send
packets at some predefined constant rate, Nmap accounts for the network
conditions (latency fluctuations, network congestion, the target interference with
the scan) during the run. Also, owing to the large and active user community
providing feedback and contributing to its features, Nmap has been able to extend
its discovery capabilities beyond simply figuring out whether a host is up or down
and which ports are open and closed; it can determine the operating system of the
target, names and versions of the listening services, estimated uptime,type of
6
device, and presence of a firewall.
SYN scan is the default and most popular scan option for good reasons. It can be
performed quickly, scanning thousands of ports per second on a fast network not
hampered by restrictive firewalls. It is also relatively unobtrusive and stealthy since
it never completes TCP connections.
Page 7
FIN scan (-sF)
Sets just the TCP FIN bit.
8
-sV (Version detection) :Enables version detection, as discussed above. Alternatively, we can
use -A, which enables version detection among other things
Page 9
PO protocol list (IP Protocol Ping) :
The newest host discovery option is the IP protocol ping, which sends IP packets with the
specified protocol number set in their IP header. The protocol list takes the same format as do
port lists in the previously discussed TCP, UDP and SCTP host discovery options
Conclusion : Network scanning provides a wealth of information about the target network,
which is valuable regardless of whether you're trying to attack the network or protect it
from attack. While performing a basic scan is a simple matter, the network scanners
covered in this experiment provide a wide array of options to tweak your scan to achieve
the best results. Nmap is used to detect IP spoofing and port scanning.
10
MCIT205 (Mobile Computing)
Experiment No: 1
Page 11
6) Recover B's Data from received signal Cs Cs * codeB[ ] = ( 0 -2 0 2 0 -2 0 2 ) *
(-1 +1 +1 -1 -1 +1 +1 -1)
= (0 -2 0 -2 0 -2 0 -2)
Sum = -8 < 0 hence B's transmitted data was Bd = 0
Algorithm :
1) Start
2) Enter sender A's data : Ad , Convert into bipolar
3) Enter sender B's data : Bd , Convert into bipolar
4) Enter A's PN sequence : codeA[ ] and Convert into bipolar
5) Enter B's PN sequence : codeB[ ] and Convert into bipolar
6) Spread A's data : As[ ] = Ad * codeA[ ]
7) Spread B's data : Bs[ ] = Bd * codeB[ ]
8) Add As[ ] and B[ ] : c[ ] = As[ ] + Bs[ ]
9) De spread A's signals ResultA [ ] = c[ ] * codeA[ ] Add values of ResultA[ ] If
sum > 0 then A's transmitted data is 1 else 0.
10) De spread B's signals ResultB [ ] = c[ ] * codeB[ ] Add values of ResultB[ ] If
sum > 0 then A's transmitted data is 1 else 0.
11) Stop.
12
MCIT205 (Mobile Computing)
Experiment No: 2
Title : Write a program to divide the given area into equal hexagons and create
clusters using given set of frequencies.
Objective : To study frequency reuse.
Reference : Mobile communication by schiller.
Prerequisite : Knowledge of frequency reuse.
The following diagram shows two clusters one with 3 cells and one with 7 cells.
We select frequency reuse factor N such a way that , the following condition
satisfied
N = i2 + i*j + j2
Thus for N =3 => i=1, j=1
Page 13
For N=7 = > i=2 , j =1
Algorithm:
1. start
2. Accept value of number of cells per cluster i.e. N from the user.
3. Create a function that draws a hexagon.
4. Draw a clusters with N hexagons in each cluster.
5. Write appropriate frequencies in each cluster.
6. stop.
14