0% found this document useful (0 votes)
152 views

2 - LA1 - Task1 (1) - Merged

The document provides instructions for two tasks in Cisco Packet Tracer: 1. Design a network with one router, one switch, and one PC, and configure IP addresses. Send a message between PCs on the same and different networks. 2. Design an email configuration network with one server and configure it to send and receive emails between two PCs. The submission should include screenshots and steps taken to configure devices and test connections for both tasks. Referenced tutorials provide demos of the tasks.

Uploaded by

Yash Shekhawat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
152 views

2 - LA1 - Task1 (1) - Merged

The document provides instructions for two tasks in Cisco Packet Tracer: 1. Design a network with one router, one switch, and one PC, and configure IP addresses. Send a message between PCs on the same and different networks. 2. Design an email configuration network with one server and configure it to send and receive emails between two PCs. The submission should include screenshots and steps taken to configure devices and test connections for both tasks. Referenced tutorials provide demos of the tasks.

Uploaded by

Yash Shekhawat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 57

Assignment 1

Task 1
A. Design the following network structure in Cisco packet tracer. Use the IP addresses given
in the diagram.

The submission file in word format should include the following:


1. The steps followed in configuring each device [one Router, one Switch, and one PC]
(compact writing expected).
2. Screenshot of any one successful connection between two PCs in two different networks.
[by sending PDUs and simulation]
3. Screenshot of the final network setup.

You may refer to the following tutorial for demo (reference only):
https://www.youtube.com/watch?v=rZw_b0wpQ00

B. Design the following email configuration network structure in Cisco packet tracer.

P.T.O
Submission should include the following:
1. The steps followed for configuring the Server (compact writing). Set the email domain as
vit.ac.in.
2. Screenshots of the following:
• a user named Alice on one PC sends an email to Bob in the other PC.
• Bob reading the email, sent to him by Alice.
• The final network setup.

You may refer to the following tutorial for demo(reference only):


https://www.youtube.com/watch?v=D0N1EMQe9SA

NOTES:
Connection between routers: Use serial Port, Serial DTE cable
Use Copper Straight-Through cable for Connection between switch and router, switch and
terminals
Use Copper crossover cable for Connection between router and server

Packet
Hop
Ping command
Email server

P.T.O
Packet Tracer – Creating a Cyber World
Addressing Table

Device IP Address Subnet Mask Site

FTP/Web Server 10.44.1.254 255.255.255.0 Metropolis Bank HQ


Email/DNS Server 10.44.1.253 255.255.255.0 Metropolis Bank HQ
NTP/AAA Server 10.44.1.252 255.255.255.0 Metropolis Bank HQ
File Backup Server 10.44.2.254 255.255.255.0 Gotham Healthcare Branch

Objectives
Part 1: Configure the FTP Server
Part 2: Configure the Web Server
Part 3: Configure the Email Server
Part 4: Configure the DNS Server
Part 5: Configure the NTP Server
Part 6: Configure the AAA Server

Background / Scenario
In this activity, you will configure basic server components. The IP addressing configuration is already
complete. You will use the Services tab on multiple servers to deploy FTP, Web, Email, DNS, NTP, and AAA
services.

Part 1: Configure the FTP Server

Step 1: Activate the FTP Service.


a. Click the Metropolis Bank HQ and then click the FTP/Web server.
b. Click the Services tab and then click FTP.
c. Turn on the FTP service using the radial button at the top.

Step 2: Allow users’ access to the FTP server.


a. Create user account names of bob, mary, and mike, each with the password of cisco123.
b. Each user account should have full permissions (RWDNL) on the FTP/Web server.

Part 2: Configure the Web Server

Step 1: Activate the HTTP Service.


a. Within the Metropolis Bank HQ, click the FTP/Web server.
b. Click the Services tab and then click HTTP.
c. Turn on both the HTTP and HTTPS services using the radial buttons at the top.

© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 4
Packet Tracer – Creating a Cyber World

Step 2: Verify the HTTP Service.


a. Click the PC named Sally, and click the Desktop tab.
b. Click the Web Browser. Browse to the website www.cisco.corp.
c. Within the Web Browser, browse to the IP 10.44.1.254.
Why would a user be able to browse to an IP address but not a FQDN?

Part 3: Configure the DNS Server

Step 1: Activate the DNS Service.


a. Within the Metropolis Bank HQ, click the Email/DNS server.
b. Click the Services tab and then click DNS.
c. Turn on the DNS service using the radial button at the top.

Step 2: Create the DNS A records.


a. Create the A record email.cisco.corp with IP address 10.44.1.253. Click Add to save the record.
b. Create the A record www.cisco.corp with IP address 10.44.1.254. Click Add to save the record.

Step 3: Verify the DNS Service.


a. Click the PC named Sally, and click the Desktop tab.
b. Click the Web Browser. Browse to the website www.cisco.corp.
Why is the user able to browse to an FQDN?

Part 4: Configure the Email Server

Step 1: Activate the Email Services.


a. Within the Metropolis Bank HQ, click the Email/DNS server.
b. Click the Services tab and then click on EMAIL.
c. Turn on both the SMTP and POP3 services using the radial buttons at the top.

Step 2: Create Email accounts for users.


a. Create the domain name of cisco.corp.
b. Create user account names of phil, sally, bob, dave, mary, tim and mike, each with the password of
cisco123.

Step 3: Configure user Email clients.


a. Click the PC named Sally, and click the Desktop tab.

© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 4
Packet Tracer – Creating a Cyber World

b. Click Email and enter the following information:


Name: Sally
Email Address: [email protected]
Incoming & Outgoing Email Server(s): email.cisco.corp
Username: sally
Password: cisco123
c. Repeat Step 3b on the PC named Bob but replace the name sally with bob as needed.
Why does the Email service require both SMTP and POP3 to be activated?

Part 5: Configure the NTP Server

Step 1: Activate the NTP Service.


a. Within the Metropolis Bank HQ, click the NTP/AAA server.
b. Click the Services tab and then click NTP.
c. Turn on the NTP service using the radial button at the top.

Step 2: Secure the NTP Service.


a. Enable the NTP authentication feature using the radial button.
b. Configure Key 1 with a password of cisco123.

Part 6: Configure the AAA Server

Step 1: Activate the AAA Service.


a. Within the Metropolis Bank HQ, click the NTP/AAA server.
b. Click the Services tab and then click AAA.
c. Turn on the AAA service using the radial button at the top.

Step 2: Configure the AAA Network Configuration.


a. Configure the Client Name HQ_Router with the Client IP 10.44.1.1 with a secret of cisco123. Click Add
to save the client information.
b. Configure the AAA user account of admin with a password of cisco123. Click Add to save the user
information.

© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 4
Packet Tracer – Creating a Cyber World

Suggested Scoring Rubric

Question Possible Earned


Activity Section Location Points Points

Part 2: Configure the Web


Server Step 2 2
Part 3: Configure the DNS
Server Step 3 2
Part 4: Configure the Email
Server Step 3 2
Questions 6
Packet Tracer Score 94
Total Score 100

© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 4
21BCE3759

ADITYA KUMAR JHA

LA-1 TASK-1&2

COURSE-ISAA LAB

TASK-1

A. Design the following network structure in Cisco packet tracer.


Use the IP addresses given in the diagram.

PC configuration
1) From End devices Choose pc drag and drop it.
2) Goto to IP configuration, then put the IPv4 address as 192.168.1.2 and
afte that put the default gateway as 192.168.1.1 (Switch IP)
PC to Switch connection.
1) Connect PC to switch with via copper straight through wire in Fast
ethernet port in order.
Switch to Router
1) Connect Switch to Router via Copper straight through wire in Fast
ethernet port in order.
Router to Router
1) Connect Router to another Router via Serial DTE in the Serial Port.
Router Interface Configuration
1) Put the IP address of Switch in Fast ethernet 0.
Router Routing Configuration
1) Type the network IP address that it wants to communicate.
2) Type Mask 255.255.255.0
3) Type the IP address of Next router in Next Hop.

Message transfer in the same network

Message transfer in two different networks


Final Setup
B. Design the following email configuration network structure in
Cisco packet tracer

PC configuration
3) From End devices Choose pc drag and drop it.
4) Goto to IP configuration, then put the IPv4 address as 192.168.1.2 and
afte that put the default gateway as 192.168.1.1 (Switch IP)
PC to Switch connection.
2) Connect PC to switch with via copper straight through wire in Fast
ethernet port in order.
Switch to Router
2) Connect Switch to Router via Copper straight through wire in Fast
ethernet port in order.
Router Interface Configuration
1) Put the IP address of Switch in Fast ethernet 0.
2) Put the IP address of Server in Fast ethernet 1.
Server Configuration
1) Put the IP address of the Server and default gateway (the path in which
packet will travel.
2) In Services of the Server go to email and write the domain name as
vit.ac.in and then setup the User with username and password.

PC configuration for sending and receiving the mail.


1) Write the name as Alice and setup the email address.
2) Put the server information.
3) Write down the login information Username and password typed in the
server and then save it.
4) Compose the mail with the Bob mail address and then send it.
5) Similarly, setup the mail for the Bob and then go the receive for inbox of
the mail.
Receive the Mail.

Reply the Mail


Final Setup
TASK-2

Part-1 Configure the FTP Server

Step-1 Activate the FTP Service.

Step-2 Allow users’ access to the FTP server.


Part -2 Configure the Web Server

Step-1 Activate the HTTP Service.

Step-2 Verify the HTTP Service.


Why would a user be able to browse to an IP address but not a FQDN?
Ans: Because the DNS server is not configured as it is only configured by the
DNS server.

Part-3 Configure the DNS Server

Step-1 Activate the DNS Service.


Step-2 Create the DNS A records.

Step-3 Verify the DNS Service.


Why is the user able to browse to an FQDN?
Because now we have configured DNS server and activated its service
and has associated the IP address with the Domain name.
Part-4 Configure the Email Server

Step-1 Activate the Email Services

Step-2 Create Email accounts for users.


Step-3 Configure user Email clients.

Why does the Email service require both SMTP and POP3 to be
activated?
Ans: Because SMTP handles the delivery while POP3 takes cares of
email retrieval.
Part-5 Configure the NTP Server

Step-1 Activate the NTP Service.

Step-2 Secure the NTP Service.


Part-6 Configure the AAA Server

Step-1 Activate the AAA Service.

Step-2 Configure the AAA Network Configuration.


d
Activity result
21BCE3123
YASH SHEKHAWAT
LA-2

Part 1: Send Email between Users


Step 1: Access the email client on Mike’s PC.
a. Click the Gotham Healthcare Branch site and then click the PC
Mike.
b. Click the Desktop tab and then click Email.

Step 2: Send an email to Sally.


a. Create an email by clicking the Compose button.
b. In the To: field, enter the email [email protected]
In the Subject: field, enter the string of text “Urgent- Call me”.
In the Message section, enter. “Call me when you are free today to
discuss the new sale.”
c. Click the Send button to transmit the email.
What protocol was used to send the email to the email server?
POP3 and IMAP(Internet Message Access Protocol) is used to retrieve
the email from the email server.

Step 3: Have Sally check her email.


a. Enter the Metropolis Bank HQ site and then click the PC Sally.
Packet Tracer – Communicating in a Cyber World
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 4
b. Click the Desktop tab and then click Email.
c. Click the Receive button to retrieve the email sent from Mike.
What protocol was used to retrieve the email from the email server?
It is generally considered to be an insecure protocol because it relies on
clear-text usernames and passwords for authentication and does not
use encryption. Data sent via FTP is vulnerable to sniffing, spoofing, and
brute force attacks, among other basic attack methods.

Part 2: Upload Files using FTP


Step 1: Set the packet sniffer to capture traffic on the correct
port.
a. Enter the geographic (root) view to see all three remote sites.
b. Click the Cyber Criminals Sniffer.
c. Click Port1 to capture packets on this port.
d. Leave the Cyber Criminal Sniffer open and visible for the rest of this part.
Step 2: Remotely connect to the FTP server.
e. Enter the Healthcare at Home site and then click the PC Mary.
f. Click the Desktop tab and then click Command Prompt.
g. Connect to the FTP/Web server at Metropolis Bank HQ by entering ftp
209.165.201.3 in the command
prompt.
h. Enter the username of mary and a password of cisco123.

Step 3: Upload a file to the FTP server.


a. At the ftp> prompt, enter the command dir to view the current files stored
on the remote FTP server.
b. Mary has a file containing sensitive information regarding new healthcare
client information.
Upload the newclients.txt file to the FTP server by entering the command put
newclients.txt.
c. At the ftp> prompt, enter the command dir and verify the newclients.txt file
is now on the FTP server.

Why is FTP considered an insecure protocol for moving files?

Step 4: Analyze the FTP traffic.


a. Enter the geographic (root) view to see all three remote sites.
b. Click the Cyber Criminals Sniffer.
c. Under the GUI tab on the left, click the 1st FTP packet available to select it.
Then scroll down to the
bottom of the window displayed on the right.
What information is displayed in clear text from the FTP header?
Username mary is displayed in the clear text from the FTP header.

d. On the left, click the 2nd FTP packet available to select it. Then scroll down
to the bottom of the window
displayed on the right. Do this again for the 3rd FTP packet.

e. Besides the username, what other sensitive information is displayed in clear


text from the FTP header?
Ans: password is also displayed [i.e.- cisco123].

Part 3: Remotely Access an Enterprise Router Using


Telnet
Step 1: Remotely connect to an enterprise router.
a. Enter the Healthcare at Home site and then click on the PC Dave.
b. Click the Desktop tab and then click Command Prompt.
c. Ping the enterprise router using the command ping 209.165.201.2 to verify
reachability.
d. Use the command telnet 209.165.201.2 to telnet to the IP address of the
enterprise router.
e. Authenticate to the enterprise router with the username of admin and the
password of cisco123.
f. Use the command show users to view the active Telnet connection to the
enterprise router.
Why is Telnet considered an insecure protocol for remotely managing a
device?
Telnet is considered an insecure protocol for remotely managing a device
because it transmits data, including usernames, passwords, and commands, in
plain text, making it susceptible to eavesdropping and unauthorized access.

Part 4: Remotely Access an Enterprise Router Using


SSH
Step 1: Remotely connect to an enterprise router.
a. Enter the Gotham Healthcare Branch site and then click the PC Tim.
b. Click the Desktop tab and then click Command Prompt.
c. Ping the enterprise router using the command ping 209.165.201.2 to verify
reachability.
d. Use the command ssh -l admin 209.165.201.2 to SSH to the IP address of
the enterprise router.
e. Authenticate to the enterprise router with the password of cisco123.
f. Use the command show users to view the active SSH connection to the
enterprise router.

Why is SSH considered a secure protocol for remotely managing a device?


SSH (Secure Shell) is considered a secure protocol for remotely
managing a device because it encrypts all communication, including
usernames, passwords, and commands, providing confidentiality,
integrity, and protection against eavesdropping, tampering, and
unauthorized access.
g. Enter the global configuration mode using configure terminal command.
h. Create an enable secret password of cisco with the command enable
secret cisco.
Task-2
Part 1: Locate the FTP Account Credentials for
Mary’s Laptop
Step 1: Access the text document on Mary’s laptop.
a. Click the Healthcare at Home site and then click the
laptop Mary.
b. Click the Desktop tab and then click Text Editor.
c. In the Text Editor window, click File > Open.
d. Click the document ftplogin.txt and click OK.
Step 2: Decrypt Mary’s FTP account information.
a. Highlight all the text from the ftplogin.txt file and copy it.
b. Open a web browser on your personal computer and browse to
the website https://encipher.it
c. Click the whitespace on the right of the website and paste in
the encrypted text.
Click the Decipher It button and use the decryption
password maryftp123 to decrypt the encrypted text.
Click Decrypt.
What is the username and password for Mary’s FTP account?
Username is mary
Password is cisco321
Part 2: Upload Confidential Data using FTP
Step 1: View the confidential document on Mary’s
Laptop.
a. Click the Healthcare at Home site and then click the
Laptop Mary.
b. Click the Desktop tab and then click Text Editor.
c. In the Text Editor window, click File > Open.
d. Click on the document clientinfo.txt and click OK.
What form is the data in?
Data is in Encrypted form.
Step 2: Remotely connect to the FTP server.
a. Within the Healthcare at Home site, click the Laptop Mary.
b. Click the Desktop tab and then click Command Prompt.
c. Connect to the FTP/Web server at Metropolis Bank HQ by
entering ftp 209.165.201.3 in the command prompt.
d. Enter the username/password credentials located in Part 1 Step 2
Step 3: Upload a file to the FTP server.
a. At the ftp> prompt, enter the command dir to view the current
files stored on the remote FTP server.
b. Mary has a file containing encrypted healthcare client information.
Upload the clientinfo.txt file to the FTP server by entering the
command put clientinfo.txt.
c. At the ftp> prompt, enter the command dir and verify
the clientinfo.txt file is now on the FTP server.
If cyber criminals were to capture the file transfer crossing the
Internet, what would be in clear text?
Username mary and password cisco321 would be in clear text.
Part 3: Locate the FTP Account Credentials for
Bob’s PC
Step 1: Access the text document on Bob’s PC.
a. Click the Metropolis Bank HQ site and then click the PC Bob.
b. Click the Desktop tab and then click Text Editor.
c. In the Text Editor window, click File > Open.
d. Click the document ftplogin.txt and click OK.
Step 2: Decrypt Bob’s FTP account information.
a. Highlight all the text from ftplogin.txt file and copy it.
b. Open a web browser on your personal computer and browse to
the website https://encipher.it
c. Click the whitespace on the right of the website and paste in
the encrypted text.
d. Click Decipher It button and use the decryption
password bobftp123 to decrypt the encrypted text. Click Decrypt.
What is the username and password for Bob’s FTP account?
Username=bob Password=ninja123
Part 4: Download Confidential Data using FTP
Step 1: Remotely connect to the FTP server.
a. Within the Metropolis Bank HQ site, click the PC Bob.
b. Click the Desktop tab and then click Command Prompt.
c. Connect to the FTP/Web server within the Metropolis Bank
HQ by entering ftp 10.44.1.254 in the command prompt.
d. Enter the username/password credentials located in Part 3 Step 2
Step 2: Download the file to Bob’s PC.
a. At the ftp> prompt, enter the command dir to view the current
files stored on the remote FTP server.
b. Mary had uploaded the clientinfo.txt file containing encrypted
healthcare client information.
Download the clientinfo.txt file to Bob’s PC by entering the
command get clientinfo.txt.
c. At the ftp> prompt, enter the command quit.
d. At the PC> prompt, enter the command dir and verify
the clientinfo.txt file is now Bob’s PC.
If cyber criminals were to capture the file transfer crossing the
Internet, what would be in clear text?
Username=bob and Password=ninja123 would be in clear text.

Part 5: Decrypt the Contents of the


clientinfo.txt File
Step 1: Receive the decryption key from Mary.
a. Within the Metropolis Bank HQ site, click the PC Bob.
b. Click the Desktop tab and then click Email.
c. In the Email window, click Receive.
d. Click on the Email with the subject “Decryption Key” and record
the decryption key below.
What is the decryption key to access the confidential information in
the clientinfo.txt file?
Cisco123

Step 2: Decrypt the contents of the clientinfo.txt file.


a. Within the Metropolis Bank HQ site, click the PC Bob.
b. Click the Desktop tab and then click Text Editor.
c. In the Text Editor window, click File > Open.
d. Click the document clientinfo.txt and click OK.
e. Highlight all the text from the clientinfo.txt file and copy it.
f. Open a web browser on your personal computer and browse to
the website https://encipher.it
g. Click the whitespace on the right of the website and paste in
the encrypted text.
Click Decipher It button and use the decryption password from
Mary’s email to decrypt the encrypted text. Click Decrypt.
What is the first account name in the clientinfo.txt file?
Plato X. Riggs

Result:
TASK 3
Part 1: Download the Client Files to Mike’s PC
Step 1: Access the FTP server from Mike’s PC.
a. Click the Gotham Healthcare Branch site and then click the PC Mike.
b. Click the Desktop tab and then click Web Browser.
c. Enter the URL http://www.cisco.corp and click Go.
d. Click the link to download the most current files.
What protocol was used to access this webpage on the backup file server?

http protocol was used to access this webpage on the backup file
server.

Step 2: The file server has been hacked, notify Sally.


a. Within the Gotham Healthcare Branch site, click the PC Mike.
b. Click the Desktop tab and then click Email.
c. Create an email and send it to [email protected] and tell her about the File Server.
Part 2: Download the Client Files from the Backup File Server to
Mike’s PC
Step 1: Access the offsite FTP server from Mike’s PC.
a. Within the Gotham Healthcare Branch site, click the PC Mike.
b. Click the Desktop tab and then click Web Browser.
c. Enter the URL https://www.cisco2.corp and click Go.
d. Click the link to view the most recent files and their hashes.
What protocol was used to access this webpage on the backup file server?

It uses https protocol to access this webpage


What are the file names and hashes of the client files on the backup server? (copy and paste
them below)

This page contains hashes for the most recent files placed on the FTP server.
FileName | NWclients.txt | Hash| dd88482282785192d4a4ad4f8e32b3b6
FileName | SWclients.txt | Hash| c202036c9210959e7b587b08f080c378
FileName | NEclients.txt | Hash| 6c8fb699ac2ced0b5c9ea40aab9f8caf
FileName | SEclients.txt | Hash| 48d7eceee217e83cd685b537a3066b2f
FileName | Sclients.txt | Hash| abad7f7606e324f252bfebd6c09810e2
FileName | Nclients.txt | Hash| 65f586602d9476b7b561b5d98b2ea23b
FileName | income.txt | Hash|
1b319bc7ba0adc63f2af2cafdc59f5279d46dd33

Step 2: Download the client files to Mike’s PC.


a. Within the Gotham Healthcare Branch site, click the PC Mike.
b. Click the Desktop tab and then click Command Prompt.
c. Connect to the Backup File server by entering ftp www.cisco2.corp in the command
prompt.
d. Enter the username of mike and a password of cisco123.
e. At the ftp> prompt, enter the command dir to view the current files stored on the remote FTP
server.
f. Download the six client files (NEclients.txt, NWclients.txt, Nclients.txt, SEclients.txt,
SWclients.txt, and Sclients.txt) to Mike’s PC by entering the command get FILENAME.txt,
replace FILENAME with one of the six client filenames.
ftp> get NEclients.txt

Reading file NEclients.txt from www.cisco2.corp:


File transfer in progress...

[Transfer complete - 584 bytes]

584 bytes copied in 0.05 secs (11680 bytes/sec)

g. After downloading all the files, enter the command quit at the ftp> prompt.
h. At the PC> prompt, enter the command dir and verify the client files are now on Mike’s PC.

Part 3: Verify the Integrity of the Client Files using Hashing


Step 1: Check the hashes on the client files on Mike’s PC.
a. Within the Gotham Healthcare Branch site, click the PC Mike.
b. Click the Desktop tab and then click Text Editor.
c. In the Text Editor window, click File > Open.
d. Click on the first document NEclients.txt and click OK.
e. Copy the entire text document contents.
f. Open a web browser on your personal computer and browse to the
website https://www.tools4noobs.com/online_tools/hash/
g. Click the whitespace and paste in the text document contents. Make sure the algorithm is set
to md2. Click Hash this!
h. To make sure a file has not been tampered with, you will compare the resulting hash with the
filename/hash information you found in Part 2 Step 1.
i. Repeat Steps d through h for each client file and compare the generated hash with the original
hash shown in Part 2 Step 1.
Which file has been tampered with and has an incorrect hash?

SEclients.txt

Step 2: Download the suspected file to Sally’s PC.


a. Click the Metropolis Bank HQ site, and then click the PC Sally.
b. Click the Desktop tab and then click Command Prompt.
c. Connect to the Backup File server by entering ftp www.cisco2.corp in the command
prompt.
d. Enter the username of sally and a password of cisco123.
e. At the ftp> prompt, enter the command dir to view the current files stored on the remote FTP
server.
f. Download the file that was found to have been tampered with in Part 3 Step 1.
g. At the ftp> prompt, enter the command quit.
h. At the PC> prompt, enter the command dir and verify the tampered client file is now on Sally’s
PC for analysis at a later time.

Part 4: Verify the Integrity of Critical Files using HMAC


Step 1: Compute the HMAC of a critical file.
a. Within the Metropolis Bank HQ site, click the PC Bob.
b. Click the Desktop tab and then click Command Prompt.
c. At the PC> prompt, enter the command dir and verify the critical file named income.txt is on
Bob’s PC.
d. Within the Desktop tab, click Text Editor.
e. In the Text Editor window, click File > Open.
f. Click the document income.txt and click OK.
g. Copy the entire text document contents.
h. Open a web browser on your personal computer and browse to the
website http://www.freeformatter.com/hmac-generator.html
i. Click the whitespace and paste in the text document contents. Enter the secret key
of cisco123. Make sure the algorithm is set to SHA1. Click Compute HMAC.
What is the computed HMAC for the contents of the file?

1b319bc7ba0adc63f2af2cafdc59f5279d46dd33
How is using HMAC more secure than general hashing?
Using HMAC is more secure than general hashing because it
involves a secret key, provides resistance against collision attacks,
and allows for message integrity verification.

Step 2: Verify the computed HMAC.


a. Within the Metropolis Bank HQ site, click the PC Bob.
b. Click the Desktop tab and then click Web Browser.
c. Enter the URL https://www.cisco2.corp and click Go.
d. Click on the link to view the most recent files and their hashes.
Does the HMAC hash for the income.txt file match?
Yes it matches!
Result:

You might also like