InformationSecurityTheoryandPractic
InformationSecurityTheoryandPractic
net/publication/350487421
CITATIONS READS
0 2,366
2 authors, including:
Sheharyar Khan
Northwestern Polytechnical University
33 PUBLICATIONS 29 CITATIONS
SEE PROFILE
All content following this page was uploaded by Sheharyar Khan on 03 April 2022.
“Practical Experiments “
Technical Report
By
Supervised by:
Professor Wei Yon
Email id # [email protected]
Student ID # 7420180062
Content:
Sniffer by Ethereal & Wireshark
Protocol analysis
Scan by Xsan & Fluxay
Procedure:
First of all we install any Sniffer tool Ethereal or wireshark. Purpose
of these tools is to scan and capture packets from network after we capture we will
try to read the data captured. There are two cases;
1. If the site is secure then data sent to server from that website will
be encrypted .Any information example , user login information
and other important bank information or important database
queries will be first encrypted and then sent to server and only
server can decrypted and understand .
2. If the site is not secure then we can capture data using any of
capturing tools and able to read data or communication data
between website and server.
Content:
Build a website by IIS in Windows
Configure IIS to provide SSL service
Sniffer and analysis the difference between HTTP & HTTPS.
Procedure:
1. Install the Certificate Service, select Add / Delete Windows
Components by adding / deleting programs in the control
panel. Find the certificate service in the windows
component wizard. Choose it and click next.
2. The system will pop up the prompt "after installing the
certificate service, the computer name and regional
membership will change, whether to continue" and we can
choose "yes".
3. Input the IP address of the local computer into the CA
public name, and leave the default information for other
settings.
Certificate request: After configuring the certificate file required by IIS, the
application will be made according to the content of the certificate.
Through the above five steps to operate our IIS certificate has passed the system
administrator's audit, the following certificate can be audited through the
establishment of SSL encryption site.
Configure IIS's SSL security encryption function: Once again, we come to the
IIS setup window to enable SSL security encryption.
Browse SSL encryption sites: After the SSL encryption site function is set up on
the server, a "security alert" window pops up when we access the site through a
browser on the client. Only after you trust this certificate you can browse the
website information properly.
Screen Shots:
EXPERIMENT NO 3: Security Email – PGP
Requirements / Goal: In this experiment we will try to learn how to do file and
email encryption using Gpg4win software .This software uses GnuPG public-key
cryptography for data encryption and digital signatures.
Content:
gpg4win
1. You can sign and encrypt email message by "Notepad". You can set
sign only or encrypt only or both, and choose the email receiver at the
"Recipients" item.
2. Click "Sign/Encrypt Notepad", enter your password. After that, you get
the PGP message for sending. You can send this message to your
friend.
3. When your friend receives this message, he can "Decrypt/Verify
4. Notepad". So he gets the plaintext and verify your signature.
5. You also can write your message in a txt file. When you want to send
this file or other types of file as an attachment, you can right-click the
file, sign and encrypt it, then you get .gpg file which can send to your
friend. Your friend can right-click the .gpg file, decrypt and verify it.
Screen Shots:
EXPERIMENT NO 4: Malicious Code Trojan
Content:
Controller: Windows server 2003 in Vmware
Target: Windows XP professional in Vmware
Software HUIGEZI
Procedure:
For this experiment we have to follow following steps;
1. Double click the Trojan file in the target system, the trojan runs. You
can see the target host in the software in controller, as the picture
below. Then you have the permission of remote control, you can do
anything you like.
2. Note: watch video in parent folder, controlling target machine and
screen sharing .
3. Clean the Trojan in target
End process IEXPLORE.EXE which is the Trojan process.
4. Run "regedit" in CMD window to open the registry, search
"GrayPigeon", and delete all the directories of search results. If you
can't delete it, right click the directory, choose "permissions", and
allow everyone's full control.
5. Then try to delete again
6. Search "com.cn.exe" in target to locate the Trojan file, and then
delete the Trojan file.
7. After all the steps, the Trojan has been cleaned. Reboot the target to
check whether there is Trojan process, service, registry; file exists,
and checks whether controller can see the target system. If not, you
have cleaned the Trojan; otherwise you have to clean again.
Screen Shots:
EXPERIMENT NO 5: Intrusion detection system – Snort
Content:
WinPcap - network packets capture
Snort - intrusion detection system
appserv - Apache/PHP/MySQL environment
Acid - web display for alerts
Adodb - database connection
Jpgraph - graphic link library
WinPcap - network packets capture
Snort - intrusion detection system
Appserv - Apache/PHP/MySQL environment
acid - web display for alerts
adodb - database connection
jpgraph - graphic link library
Screen Shots:
Experiment No 6: Information hiding
Content:
Eclipse
Net-beans tools
JAVA