Tuesday, February 9, 2010

ITC 358 Ass02 _Task02

Step 01
Hash Generator program can be downloaded from the followiing URL as shown in the figure below.




Step 05
In the process of generating md5deep Hash , I'm writing some text in the Ms Word 2003 to show some the effects of it.



Step 06
Now I saved the following document as the filename as Country1.doc.




Step 09
Now to start the application  "MD5DEEP" , to generate some hash function, on the designated location of the file, I typed the following md5deep conutry1.doc command as follow.



The length for this Hash is 64 bits.

Step 10
This is the process of generating the Hash for the accompanying documentation file MD5DEEP.TXT


The result for the application, comes as the length of this hash is 64 bits which is very similar to the length of the country1.doc, since it's the accompanying documentation file of the MD5DEEP application the strength of this particular document is quite different and higher is rate than of Country1.doc, user created file.

Step 11
Again to try different with different scenario , I'm opening the same Country1.doc file.




Step 12

Now here, i have removed the period at the end of the sentence and saved the document as Country2.doc




Step 13

To create the MD5 hash for the Country2.doc, I did the following action.



The difference to the hash has been to the different way but the size remain same, although the data in the following document is same as Conutry1.doc but removing the period made such changes.
Step 14

Following is the screenshot for the more hash functions



The comparasion result between Country1.doc and Country2.doc file with the variuos hash application are as follows in the Respective order.

Application   Length of Country1.doc Length of  Country2.doc  Comment
MD5DEEP         128 bits                               128 bits                      Non Identical
SHA-1              160 bits                             160 bits                      Non Identical
SHA-256          256 bits                              256 bits                      Non Identical
Whirlpool          512 bits                             512 bits                        Non Identical.


Reference:
P. Dalmaris. Security + Guice to the Network Security Fundamentals, Third Edition, Chapter 11, Basic Cryptography, Lecture Slides

Tuesday, February 2, 2010

ITC 358 Ass02 _Task03

Spoof a MAC Address using SMAC
Step 01
Go to the following URL for downloading SMAC 2.0 software for spoofing MAC address.





Step 07
SMAC displays the Network interface card adapters as following in the picture.



Step 09
To record the current MAC address click on Active MAC as in the following screenshot.





Step 11
To update the MAC address into the new spoofed one click on Updtae MAC and Click YES.




Step 13
To verify the updates or spoofed MAC address , go to command prompt and note the spoofed MAC address as follows.




Step 14
To find out the updated ip address type ipconfig/all in the command prompt screen.

Friday, January 29, 2010

ITC 358 Ass02 _Task01

Step 01

The Wireshark is one of the protocol analyzer(also called a Sniffer) which captures the packets to decode and analyze its co
Onntents. To download the following program we can browse the following website and download as required.



Step 06
To capture the network interface adapter following procedure as shown in figure helps out, to capture desired network interface we can just select and click on Start



Step 07
To generate some network traffic here I have used some command which is highlighted in the following 2 network traffic





Step 08

Due to security reason the bluehost.com doesn't allow to host the website for following task (kindly have a look on the following figure as type the site as given), so I'm proceeding as Step09





Step 09
Now I'm searching some username and password as Gerald and happy respectively as follows as I did in ITC358 assignment 01.



Step 14

The in search for Gerald as username and happy for password has been generated at the bottom of the screen as shown.



To prevent Wireshark to capture the datas, various filters can be used like capture filter, various firewall rules can be applied.So I found wireshark as a very flexible network protocol analyzer can be composed according to the user.

Retest01

This is the 1st test LINE

Thsi= is the 2nd test line

3rd post

4th post

Thursday, January 28, 2010

ITC 358 Ass02 _Task04

Nessus Vulnerability Scanner


Step 01
In order to download the program called Nessus following URL helps and can be done as shown in figure



Step 03
To register the software enter the detail as shown in figure



Step 05
To start the Nessus Derver configuration following displayed windows will be fruitful and the task can be operated as desired by the Admin.



Step 06

Nessus Client Software can be opearated for any host as shown in the figure.






Step 10

While Starting the Nessus Client Software for the host, the following message appears stated as shown in the figure below.


Step 13
To scan the Networks the IP range has to be provided , and has to be provided as shown in the figure below, which scans for the host in the network.



Step 15
Scanning the network is done as shown in the figure, which shows the host that are connected in the Network in the form of IP addresses.



Step 17
When the scan of the network is finished the detailed about protocols and services can be found in the left pane and and its details can be generated from the right pane as shown in the figure, while noting the Risk Factor of each item, the status shows as None  which means the system is under contorl and no vulenrable act has been in the particular protocol or  service of the particular host of the network.




The information that has been detailed by the following Nessus Vulnerability Scanner can be very useful to the anyone , where most of the details of the Network Activities are scanned and listed. By analysing all these information we can prevent the Network system from the Vulenerable attacks in order to run the Network system smoothly.