NAVYA Ethical Assign
NAVYA Ethical Assign
Assignment
Submitted by:
Navya Sagar
102103739
BE 4th Year, COE
Submitted TO:
Q Objective:
Understand and demonstrate basic network security concepts and ethical hacking fundamentals,
including:
1
What is Social Engineering?
Social Engineering manipulates human behavior to trick people into giving up confidential info.
Common types:
2
4. Pretexting – Creating a false identity to gain trust.
Q-2. To execute following NMAP, HPING3 commands and study output of
each command
Tool Command Target Address Type of Scan
3
nmap -sT -F
nmap -sS -F
4
nmap -sU –F
5
nmap -sF -F
6
nmap -O -F
7
nmap -p22 -O
8
nmap -p 1-
9
nmap -A -F
10
nmap -sV -F
11
12
nmap 192.168.10.0/24
13
nmap 10.1.1.5-100
14
nmap www.google.com
Portscanning of hping3
15
Syn Flood attack
Q-3. To capture Wi-Fi Traffic using Wireshark and implement the following
IP filtering
Port filtering
HTTP Analysis
16
IP filtering
IP filtering
Port filtering
17
OSI network layer analysis
18
TCP packet capture analysis
HTTPAnalysis
19
UDP wireshark analysis
20
ARPpacketanalysis
Q4. To study system threat attacks like Distributed Denial of Services using Trinoo
What is DDoS?
21
Distributed Denial of Service (DDoS) is an attack where multiple compromised systems
flood a target (usually a server or a website) with traffic to exhaust resources and make it
unavailable to legitimate users.
Working:
Impact:
Overview:
Attackers capture passwords through:
1. Phishing Pages:
o Clone real websites (like Facebook).
o Users enter credentials into fake forms.
2. Keyloggers:
o Software records keystrokes on a victim's machine.
3. JavaScript Injection:
o Malicious code inserted into web forms to steal inputs.
4. Man-in-the-Middle Attacks (MITM): o Intercept data between user and server
using tools like Wireshark.
Defense:
22
Q6. To study different types of attacks caused by Virus and Trojans
Viruses:
Trojans:
Honeypot:
A security mechanism that sets up a fake vulnerable system to attract attackers.
Purpose:
How it works:
Popular Tools:
DES Overview:
23
Steps:
1. Key generation
2. Initial permutation
3. 16 rounds of Feistel function
4. Final permutation
int main() {
DES_cblock key = "mysecret";
DES_key_schedule schedule;
DES_set_key_unchecked(&key, &schedule);
const_DES_cblock input =
"HELLO123";
DES_cblock output;
DES_cblock decrypted;
DES_ecb_encrypt(&output, &decrypted, &schedule, DES_DECRYPT);
Overview:
Steps:
24
#include <stdio.h>
#include <openssl/rsa.h>
#include <openssl/pem.h>
#include <openssl/err.h>
#include <string.h>
int main()
{ int
ret;
RSA *rsa_keypair = NULL;
BIGNUM *bne = NULL;
BIO *pri = NULL, *pub = NULL;
size_t pri_len, pub_len; char
*pri_key, *pub_key;
unsigned char message[] = "Hello RSA!";
unsigned char encrypted[256]; unsigned
char decrypted[256];
rsa_keypair = RSA_new();
ret = RSA_generate_key_ex(rsa_keypair, bits, bne, NULL);
if (ret != 1) return -1;
// Cleanup
RSA_free(rsa_keypair);
BN_free(bne);
return 0;
25
}
Run it:
bash CopyEdit
./rsa_example
What it is:
Access control based on client IP address.
In /etc/hosts.allow: sshd:
192.168.1.100
In /etc/hosts.deny: sshd:
ALL
Explanation:
26
Applications:
27