0% found this document useful (0 votes)
34 views

SYSTEMS AND NETWORK SECURITY LAB - Syllabus

Uploaded by

Rohit Ahire
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views

SYSTEMS AND NETWORK SECURITY LAB - Syllabus

Uploaded by

Rohit Ahire
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Paper Code: WCYP-6204 L T P C

Paper Name: SYSTEMS AND NETWORK SECURITY LAB 0 0 2 1

List of Experiments
1. Write a procedure to Logon and Logoff to linux in both Text mode and graphical
mode.
[ https://kodekloud.com/blog/linux-local-and-remote-graphical-and-text-mode-console/]
2. Configure a DNS Server with a domain name of your choice.[
https://www.ninjaone.com/blog/how-to-configure-a-dns-server/ ]
3. Configure FTP on Linux Server. Transfer files to demonstrate the working of the same.[
https://www.geeksforgeeks.org/how-to-setup-and-configure-an-ftp-server-in-linux-2/]
[https://www.filestash.app/online-ftp-client.html] [https://blog.kubesimplify.com/how-to-setup-
your-ftp-server-in-linux]
4. Detection of Malicious Code in Registry and Task Manager
[https://www.albany.edu/~goel/classes/spring2008/itm416/notes/ApplicationSecurityLab.pdf]
5. Checking for rootkits existence in windows.[ https://geekflare.com/rootkits-detection-and-
removal-tools/]
6. Extracting website map using sam spade (any web crawler)[
https://flylib.com/books/en/2.819.1.77/1/]
7. Techniques to stop web crawler[https://www.inmotionhosting.com/support/website/how-to-stop-
search-engines-from-crawling-your-website/] https://www.geeksforgeeks.org/port-scanning-
techniques-by-using-nmap/
8. Sniff the network traffic while performing port scanning using Nmap.[
https://www.geeksforgeeks.org/port-scanning-techniques-by-using-nmap/]
9. Perform port scanning on Metasploitable 2 vulnerable
VM[https://www.techtarget.com/searchsecurity/feature/How-to-use-Nmap-to-scan-for-open-ports]
[https://www.digitalocean.com/community/tutorials/how-to-use-nmap-to-scan-for-open-ports]
10. Install JCrypt tool (or any other equivalent) and demonstrate Asymmetric, Symmetric
crypto algorithm, Hash and Digital/PKI signatures studied in theory Network Security
and Management.[ https://www.linkedin.com/pulse/cryptography-encryption-hash-functions-
digital-signature-eray-altili/]
11.Write a client-server program where client sends a text message to server and server
sends the text message to client by changing the case(uppercase and lowercase) of
each character in the message.[ https://www.geeksforgeeks.org/tcp-server-client-implementation-in-
c/] [https://www.slideshare.net/slideshow/tcpip-client-server-program-examplehere-is-a-simple-
example-of-pdf/257045890]
12. Write a client-server program to implement following classical encryption techniques:[
https://www.brindavancollege.com/ENG/ISE/SEM7/Cryptography_18CS744.pdf]
(I) Ceaser cipher [https://www.geeksforgeeks.org/caesar-cipher-in-cryptography/] (II)
Transposition cipher[https://www.scaler.com/topics/caesar-cipher-program-in-c/]
(III) Row substitution cipher [
(IV)Hill cipher

Text Books
1. Network and System Security ,John R Vacca , 2nd edition , Syngress publications

You might also like