0% found this document useful (0 votes)
100 views

Lab Iii

This document contains information about experiments from two courses: 1. The MCIT201 course experiments include using the ARPWATCH tool to detect ARP spoofing and using NMAP to scan open ports with different options. 2. The MCIT205 course experiments include implementing Code Division Multiple Access (CDMA) and creating frequency reuse clusters by dividing an area into equal hexagons and assigning frequencies. 3. The document provides objectives, requirements, theory, and procedures for conducting each experiment along with expected outcomes for students. Diagrams and sample outputs are included to illustrate concepts.

Uploaded by

Kumar Ji
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views

Lab Iii

This document contains information about experiments from two courses: 1. The MCIT201 course experiments include using the ARPWATCH tool to detect ARP spoofing and using NMAP to scan open ports with different options. 2. The MCIT205 course experiments include implementing Code Division Multiple Access (CDMA) and creating frequency reuse clusters by dividing an area into equal hexagons and assigning frequencies. 3. The document provides objectives, requirements, theory, and procedures for conducting each experiment along with expected outcomes for students. Diagrams and sample outputs are included to illustrate concepts.

Uploaded by

Kumar Ji
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Department of Information Technology

Lab-III (MCIT-206)

MCIT201 (Information Security System)

S.N Experiment Page


Detect ARP spoofing using open source tool ARPWATCH 2
1
Download and install nmap. Use it with different options to scan open ports. 6
2

MCIT205 (Mobile Computing)

S.N Experiment Page

1 To implement Code Division Multiple Access (CDMA). 11

2 Study of GPRS services 13


MCIT201 (Information Security System)

Experiment No: 1
Detect ARP spoofing using open source tool ARPWATCH

Aim: Detect ARP spoofing using open source tool ARPWATCH.

Objective: Objective of the module to find ARP spoofing using open source.

Outcomes: Students will be able to:-


 Identify network vulnerability with tool usage.
 Also recognize the need of such tool to identify ARP spoofing, and an ability
to engage in life-long learning to exploit gained skills and knowledge of
contemporary issues.

Hardware / Software Required : ARPWATCH Tool


Theory:
Arpwatch Commands and Usage
To watch a specific interface, type the following command with ‗-i‗ and device name.
# arpwatch –i eth0

So, whenever a new MAC is plugged or a particular IP is changing his MAC


address on the network, we notice syslog entries at ‗/var/log/syslog‗ or
‗/var/log/message‗ file.
#tail –f/var/log/messages

Sample Output

2
The above output displays new workstation. If any changes are made, you will get
following output.

You can also check current ARP table, by using following command.
#arp –a
Sample Output

If you want to send alerts to your custom email id, then open the main configuration
file‗/etc/sysconfig/arpwatch‗ and add the email as shown below.

Page 3
Here is an example of an email report, when a new MAC is connected on.

Conclusion:
Arpwatch is a software or program tool for monitoring Address
Resolution Protocol traffic on a computer network. Its main goal is to detect
arp poisoning attacks like (e.g. ARP Poisoning, Ettercap, and Netcut) also

4
detect intruders in your network by sending an email to an administrator
when new Ethernet MAC addresses seen on the network.

Page 5
MCIT201 (Information Security System )

Experiment No: 2
Download and install nmap. Use it with different options to scan open ports.

Aim: Download and install nmap. Use it with different options to scan open ports

Objective: objective of this module to learn nmap installation & use this to scan
different ports.

Outcomes: Student will be able to:-


Scan the network using scanning techniques available in NMAP.
Use current techniques, skills, and tools necessary for computing practice

Hardware / Software Required: NMAP Tool

Theory:
Nmap (Network Mapper) is a security scanner originally written by Gordon Lyon
(also known by his pseudonym Fyodor Vaskovich) used to discover hosts and
services on a computer network, thus creating a "map" of the network. To
accomplish its goal, Nmap sends specially crafted packets to the target host and
then analyzes the responses. Unlike many simple port scanners that just send
packets at some predefined constant rate, Nmap accounts for the network
conditions (latency fluctuations, network congestion, the target interference with
the scan) during the run. Also, owing to the large and active user community
providing feedback and contributing to its features, Nmap has been able to extend
its discovery capabilities beyond simply figuring out whether a host is up or down
and which ports are open and closed; it can determine the operating system of the
target, names and versions of the listening services, estimated uptime,type of

6
device, and presence of a firewall.

Basic commands working in Nmap

For target specifications:


nmap <target‘s URL or IP with spaces between them>
For OS detection:
nmap -O <target-host's URL or IP>
For version detection:
nmap -sV <target-host's URL or IP>

After the installation of nmap:> sudo apt-get install nmap

SYN scan is the default and most popular scan option for good reasons. It can be
performed quickly, scanning thousands of ports per second on a fast network not
hampered by restrictive firewalls. It is also relatively unobtrusive and stealthy since
it never completes TCP connections.

Page 7
FIN scan (-sF)
Sets just the TCP FIN bit.

8
-sV (Version detection) :Enables version detection, as discussed above. Alternatively, we can
use -A, which enables version detection among other things

Page 9
PO protocol list (IP Protocol Ping) :

The newest host discovery option is the IP protocol ping, which sends IP packets with the
specified protocol number set in their IP header. The protocol list takes the same format as do
port lists in the previously discussed TCP, UDP and SCTP host discovery options

Conclusion : Network scanning provides a wealth of information about the target network,
which is valuable regardless of whether you're trying to attack the network or protect it
from attack. While performing a basic scan is a simple matter, the network scanners
covered in this experiment provide a wide array of options to tweak your scan to achieve
the best results. Nmap is used to detect IP spoofing and port scanning.

10
MCIT205 (Mobile Computing)

Experiment No: 1

Title : To implement Code Division Multiple Access (CDMA).


Objective : To study code division Multiplexing.
Reference : Mobile communication by Schiller Prerequisite : Knowledge of
orthogonal codes and Code Division Multiplexing.

Description : Code Division Multiple Access (CDMA) is a method of


multiplexing that does not divide a channel by time as in TDMA or frequency as in
FDMA. Instead all active users use the same frequency at the same time.
Separation of channels is now achieved by code . This scheme encodes data using
special code associated with each channel called chipping sequence (or Pseudo
random Noise sequence ).The codes used here are orthogonal and has good auto-
correlation property. CDMA multiples the data being transmitted by a "noise"
signal ( chipping sequence). This noise signal is a pseudo random sequence of 1
and −1 values, at a frequency much higher than that of the original signal, thereby
spreading the energy of the original signal into a much wider band. De spreading
requires the receiver to apply the same PN sequence on the received signal to
recover data.

Example: 1) Sender A's data Ad = 1 => Bipolar Ad = +1 Sender B's data Bd = 0


=> Bipolar Bd = -1
2) A's Chip code is codeA[ ] : 0 0 1 1 0 0 1 1 => Bipolar conversion is : -1 -1 +1
+1 -1-1 +1 +1 B's Chip code is codeB[]: 0 1 1 0 0 1 1 0 Bipolar conversion is : -1
+1 +1 -1 -1 +1 +1 -1
3) Spread A's data As =1 * ( -1 -1 +1 +1 -1 -1 +1 +1) = (-1 -1 +1 +1 -1 -1 +1 +1)
Spread B's data Bs = -1 * (-1 +1 +1 -1 -1 +1 +1 -1) = (+1 -1 -1 +1 +1 -1 -1 +1)
4) Send the sum of As+Bs Cs = As + Bs = (0 -2 0 2 0 -2 0 2)
5) Recover As Data from received signal Cs Cs * codeA[ ] = ( 0 -2 0 2 0 -2 0 2 ) *
(-1 -1 +1 +1 -1-1 +1 +1)
= (0 2 0 2 0 2 0 2)
Sum = 8 > 0 hence A's transmitted data was Ad=1

Page 11
6) Recover B's Data from received signal Cs Cs * codeB[ ] = ( 0 -2 0 2 0 -2 0 2 ) *
(-1 +1 +1 -1 -1 +1 +1 -1)
= (0 -2 0 -2 0 -2 0 -2)
Sum = -8 < 0 hence B's transmitted data was Bd = 0

Algorithm :
1) Start
2) Enter sender A's data : Ad , Convert into bipolar
3) Enter sender B's data : Bd , Convert into bipolar
4) Enter A's PN sequence : codeA[ ] and Convert into bipolar
5) Enter B's PN sequence : codeB[ ] and Convert into bipolar
6) Spread A's data : As[ ] = Ad * codeA[ ]
7) Spread B's data : Bs[ ] = Bd * codeB[ ]
8) Add As[ ] and B[ ] : c[ ] = As[ ] + Bs[ ]
9) De spread A's signals ResultA [ ] = c[ ] * codeA[ ] Add values of ResultA[ ] If
sum > 0 then A's transmitted data is 1 else 0.
10) De spread B's signals ResultB [ ] = c[ ] * codeB[ ] Add values of ResultB[ ] If
sum > 0 then A's transmitted data is 1 else 0.
11) Stop.

Conclusion : CDMA has been studied.

12
MCIT205 (Mobile Computing)

Experiment No: 2

Title : Write a program to divide the given area into equal hexagons and create
clusters using given set of frequencies.
Objective : To study frequency reuse.
Reference : Mobile communication by schiller.
Prerequisite : Knowledge of frequency reuse.

Description: Cellular system for mobile communication implements SDM. Each


transmitter typically called a base station covers a certain area called a cell.
However to avoid interference between transmitters which are within each others
interference range, we use FDM. The general goal is never use the same frequency
at the same time within the interference range. In order to do this , cells are
grouped in to disjoint frequency units called clusters. The number of different
frequencies used in a cluster is termed as frequency reuse factor N.

The following diagram shows two clusters one with 3 cells and one with 7 cells.
We select frequency reuse factor N such a way that , the following condition
satisfied
N = i2 + i*j + j2
Thus for N =3 => i=1, j=1

Page 13
For N=7 = > i=2 , j =1

Algorithm:
1. start
2. Accept value of number of cells per cluster i.e. N from the user.
3. Create a function that draws a hexagon.
4. Draw a clusters with N hexagons in each cluster.
5. Write appropriate frequencies in each cluster.
6. stop.

Conclusion: Frequency reuse has been studied.

14

You might also like