Baptiste Lab 7 Encrypting and Decrypting Files With Public Key Infrastructure
Baptiste Lab 7 Encrypting and Decrypting Files With Public Key Infrastructure
Infrastructure
Glenroy Baptiste
0L01
Section 1: Hands-On Demonstration: Part 1: Create Encryption Keys
Step 11: Make a screen capture showing Nancy’s public key
Glenroy Baptiste
Glenroy Baptiste
Section 1: Hands-On Demonstration: Part 3: Decrypt a File
Step 3: Make a screen capture showing the decrypted message
Glenroy Baptiste
Step 14: Make a screen capture showing the output of the ls command
Glenroy Baptiste
Glenroy Baptiste
Step 25: Make a screen capture showing the contents of the decrypted file
Glenroy Baptiste
Glenroy Baptiste
Step 20: Make a screen capture showing the encrypted contents of the
S2_yourname_newfile_ENCRYPTED.txt file
Glenroy Baptiste
Step 30: Make a screen capture showing the decrypted contents of the
S2_yourname_newfile_DECRYPTED.txt file
Glenroy Baptiste
You are conducting a security investigation of malicious activity that took place on the
TargetLinux01 workstation. As part of your investigation, you would like to send a log file
from the system to your instructor to get advice on interpreting login attempts. The
authentication log is stored in the /var/log/auth.log file.
Log into the TargetLinux01 system using the student account, obtain a copy of the file, and
encrypt it using AES encryption so that only Matthew Hunter can read the file.
Make a screen capture showing the commands used to encrypt and copy the file.
Next, copy the file to the instructor account and decrypt it there.
Make a screen capture showing the commands used to copy and decrypt the file.
I’ve encrypt the file, I can see the encrypted file in the /tmp, however I am unable to execute
successful decryption. I am receiving errors which I have not been able to figure out.
Glenroy Baptiste