EX : 01
Using Wireshark to Explore Protocol Headers
DATE :
Aim :
Using Wireshark to Explore Protocol Headers
Procedure:
• Install Wireshark on your system.
• Launch Wireshark and start a packet capture on the network interface you are using.
• Visit any website and observe the captured packets.
• Look at the packet details to identify the Ethernet, IP, TCP, HTTP, and other protocol
headers.
• Analyze the headers to understand the information contained in each layer.
Flow Diagram
Output:
- Ethernet II: Src MAC, Dst MAC
- IPv4: Src IP, Dst IP, TTL
- TCP: Src Port, Flags
- HTTP: GET /index.html
Result:
The procedure is followed successfully.
EX : 02
Demonstrate Two Different Certificates Producing Same MD5 Hash
DATE :
Aim
Demonstrate Two Different Certificates Producing Same MD5 Hash
Procedure:
• Study MD5 hash collisions using tools like HashClash or online examples.
• Obtain two sample X.509 certificates with same MD5 hash.
• Use OpenSSL or hashing tool to verify MD5 collisions.
Flow Diagram
Output:
Same MD5 hash for both files.
Result:
The procedure is followed successfully.
EX : 03
Computing MACs, HASH and HMAC for Messages
DATE :
Aim
Computing MACs, HASH and HMAC for Messages
Procedure:
• Write or use a script to compute HASH using SHA-256.
import hashlib
import hmac
msg = b"Hello"
key = b"secret"
print("SHA256:", hashlib.sha256(msg).hexdigest())
print("HMAC:", hmac.new(key, msg, hashlib.sha256).hexdigest())
• Compute HMAC using a secret key and SHA algorithm.
• Compare results and understand message integrity checking.
Flow Diagram:
Output:
SHA256 and HMAC values
Result:
The procedure is followed successfully.
EX : 04
Implement and Demonstrate Buffer Overflow Attack
DATE :
Aim :
Implement and Demonstrate Buffer Overflow Attack
Procedure
• Create a C program vulnerable to buffer overflow.
• Compile without stack protection (e.g., -fno-stack-protector).
• Input large strings to exploit and overwrite memory.
• Observe abnormal program behavior.
Flow Diagram :
Output :
Segmentation fault or return address overwrite.
Result:
The procedure is followed successfully.
EX : 05
Implement and Demonstrate DoS and DDoS Attacks
DATE :
Aim:
Implement and Demonstrate DoS and DDoS Attacks
Procedure
• Use tools like LOIC or Hping3 to generate DoS traffic.
• Simulate DDoS using multiple virtual machines or containers.
• Observe server slowdowns or unresponsiveness
Flow Diagram
Output:
Target server becomes slow or unreachable under traffic.
Result:
The procedure is followed successfully.
EX : 06
Implement ARP Attack and Man-in-the-Middle (MITM)
DATE :
Aim:
To Implement ARP Attack and Man-in-the-Middle
Tools Required:
• Ettercap for Windows
• Wireshark
Procedure:
• Install Ettercap from the official website and follow instructions.
• Install Wireshark to monitor network traffic.
• Enable IP forwarding by executing a registry command in Administrator CMD.
• Launch Ettercap, scan for hosts, add target and gateway to target list.
• Initiate ARP poisoning and start sniffing.
• Monitor captured traffic using Wireshark.
Flow Chart
Output:
Captured packets between the victim and the gateway displayed in Wireshark.
Result:
Successfully performed ARP spoofing and intercepted network traffic.
EX : 07
Implement Botnet Attack Detection Using Public Dataset
DATE :
Aim:
Implement Botnet Attack Detection Using Public Dataset.
Tools Required:
• Python (Anaconda)
• Jupyter Notebook
• Scikit-learn
• Pandas
• NumPy
• N-BaIoT Dataset
Procedure:
• Install Anaconda and launch Jupyter Notebook.
• Download N-BaIoT dataset from Kaggle.
• Load dataset using Pandas, preprocess it.
• Split into training/testing datasets.
• Train a classifier like Random Forest.
• Evaluate performance with accuracy, precision, recall.
Flowchart
Output:
Classification report displaying the model's accuracy, precision, and recall.
Result:
Successfully detected botnet activities using ML on Windows.
EX : 08
Explore and Install Snort Intrusion Detection Tool
DATE :
Aim:
Explore and Install Snort Intrusion Detection Tool
Tools Required:
• Snort
• WinPcap or Npcap
Procedure:
• Install WinPcap or Npcap.
• Download and install Snort for Windows.
• Edit snort.conf with correct rule paths.
• Run Snort in test mode to check configuration
Flowchart
Output:
Snort initializes without errors and is ready to monitor traffic.
Result:
Successfully installed and configured Snort.
EX : 09
Implement Firewall Rules Using Snort
DATE :
Aim :
To Implement Firewall Rules Using Snort
Tools Required:
• Snort
• Custom rule set
Procedure:
• Create a rule in local.rules (e.g., alert on HTTP connections).
• Include local.rules in snort.conf.
• Run Snort with the configuration.
• Generate HTTP traffic and check for alerts.
Flowchart
Output:
Snort alerts displayed on the console when HTTP traffic is detected.
Result:
Firewall rules implemented successfully using Snort.
EX : 10
Generate Network Attack and Detect Using Snort
DATE :
Aim:
To Generate Network Attack and Detect Using Snort
Tools Required:
• Snort
• Metasploit
• Target system (VM)
Procedure:
• Install Metasploit Framework on a separate system or VM.
• Ensure target system is on same network.
• Configure and run Snort to detect the attack.
Flowchart
Output:
Snort detects and logs attack patterns from Metasploit.
Result:
Successfully detected network attack using Snort.