Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
15 views12 pages

CS Lab Manual

https://www.crackitupdates.com/hiring/wipro

Uploaded by

pakashsurya249
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views12 pages

CS Lab Manual

https://www.crackitupdates.com/hiring/wipro

Uploaded by

pakashsurya249
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Parul University

FACULTY OF ENGINEERING AND TECHNOLOGY


BACHELOR OF TECHNOLOGY

(303105342)

VII SEMESTER

Computer Science & Engineering Department

Laboratory Manual
Session 2024-25
Faculty of Engineering & Technology
Subject Name : CS Laboratory
Subject Code : 303105342
B.Tech CSE Year 4th Semester 7th

CERTIFICATE
This is to Certify that

Mr./Ms. ㅤㅤㅤㅤㅤ Kush Rakesh Patel ㅤ ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ


With enrolment no. ㅤ 2203051050912 has successfully completed his/her
Laboratory experiments in Cyber Security From the
department of ㅤㅤㅤ COMPUTER SCIENCE AND ENGINEERING ㅤ ㅤㅤ during the
academic year 2025 - 2026 ㅤㅤ

Date of Submission : ………………………. Staff In Charge: ……………………….

Head of department: ……………………….


Faculty of Engineering & Technology
Subject Name : STQA Laboratory
Subject Code : 303105378
B.Tech CSE : Year 4th Semester 7th

TABLE OF CONTENT

Page No
Sr. Date of Marks (out
Experiment Title Sign
No Completion of 10)
From To

1. Implementation to gather
information from any PC’s
connected to the LAN using
whois, portscanners, network
scanning, Angry IP scanners etc.
2. Experiments with open
source firewall/proxy
packageslike iptables,squid
etc.
3.
Implementation of Steganography.

4. Implementation of MITM- attack


using wireshark / network sniffers.

Implementation of
5.
Windowssecurity using firewalls
and other tools.

6. Implementation to identify web


vulnerabilities, using OWASP project.

7. Implementation of IT Audit,
malware analysis and
Vulnerability assessment and
generate the report.
8. Implementation of OS hardening
and RAM dump analysisto collect
the Artifacts and other Information.
9. Implementation of Mobile Audit
and generate the report of the
existing Artifacts.
10. Implementation of Cyber
Forensicstoolsfor Disk Imaging,
Data acquisition, Data extraction
and Data Analysis and recovery.

Kush R Patel 2203051050912 Page 3


Faculty of Engineering & Technology
Subject Name : STQA Laboratory
Subject Code : 303105378
B.Tech CSE : Year 4th Semester 7th

Practical – 1

Aim :- Implementation to gather information from any PC’s connected to the LAN using who.is, port
scanners, network scanning, Angry IP scanners etc.

Theory :-
1. Who.is
whois search for an object in a WHOIS database. WHOIS is a query and response protocol that is
widely used for querying databases that store the registered users of an Internet resource, such as a
domain name or an IP address block but is also used for a wider range of other information. Most
modern versions of whops try to guess the right server to ask for the specified object. If no guess can
be made, whops will connect to whops.networksolutions.com for NIC handles or whops.arin.net for
IPv4 addresses and network names.
Examples:  Obtaining the domain WHOIS record for computer solutions.com  WHOIS record by
IP querying  Querying WHOIS in google search engine

Implementation
Step – 1: search who.is in web browser

Step – 2: Enter the domain name or IP address

Kush R Patel 2203051050912 Page 4


Faculty of Engineering & Technology
Subject Name : STQA Laboratory
Subject Code : 303105378
B.Tech CSE : Year 4th Semester 7th

Step – 3: Output

2. Port Scanners
Nmap is convenient during penetration testing of networked systems. Nmap provides the network
details, and also helps to determine the security flaws present in the system. Nmap is platform-
independent and runs on popular operating systems such as Linux, Windows and Mac.

Nmap is a useful tool for network scanning and auditing purposes


 It can search for hosts connected to the Network.
 It can search for free ports on the target host.
 It detects all services running on the host with the help of operating system.
 It also detects any flaws or potential vulnerabilities in networked systems.

Implementation :

Step – 1: Install Nmap in Windows

Step – 2: Open Nmap

Kush R Patel 2203051050912 Page 5


Faculty of Engineering & Technology
Subject Name : STQA Laboratory
Subject Code : 303105378
B.Tech CSE : Year 4th Semester 7th

Step – 3: Open command prompt and give command ipconfig to see local network

Step 4: Paste ip address in target select scan type and press scan button.

Output :

Kush R Patel 2203051050912 Page 6


Faculty of Engineering & Technology
Subject Name : STQA Laboratory
Subject Code : 303105378
B.Tech CSE : Year 4th Semester 7th

Step 5: Open Command prompt Run as administrator.

3. Angry IP Scanner

The good thing about Angry IP Scanner is that it lets you scan IP addresses in three different ways.
They are, the range you specified, a random IP address or a list of IP addresses from a text file. You
can easily select the scan mode from the drop-down menu next to the IP address field.

Kush R Patel 2203051050912 Page 7


Faculty of Engineering & Technology
Subject Name : STQA Laboratory
Subject Code : 303105378
B.Tech CSE : Year 4th Semester 7th

Practical – 3
Kush R Patel 2203051050912 Page 8
Faculty of Engineering & Technology
Subject Name : STQA Laboratory
Subject Code : 303105378
B.Tech CSE : Year 4th Semester 7th

Aim :- Implementation of Steganography.

Theory :-

Steganography is the practice of hiding secret information within another non-secret medium (like images,
audio, or video) such that the existence of the information is concealed. The primary goal is to prevent
detection of hidden data rather than protect the content itself.

Unlike encryption, which makes data unreadable to unauthorized users, steganography hides the existence
of data altogether.

Implementation :-
1. Preparation :
 Identify the secret data (text, file, document, etc.).
 Select a cover image that will carry the hidden data.
 Optionally, set an encryption password to further secure the hidden data.

2. Embedding Phase :
 Open OpenStego → Select Data Hiding mode.
 Upload the cover image.
 Select the secret file to hide.
 Specify output path for the stego-image (image with hidden data).
 Enter a password if encryption is desired.
 Execute the embedding process.

3. Extraction Phase :
 Open OpenStego → Select Extract Data mode.
 Provide the stego-image.
 Input the password if encryption was applied.
 Extract the hidden file to a desired location.

Output :-

Encryption Process -
Kush R Patel 2203051050912 Page 9
Faculty of Engineering & Technology
Subject Name : STQA Laboratory
Subject Code : 303105378
B.Tech CSE : Year 4th Semester 7th

Step – 1 :-

Step – 2 :-

Step – 3 :-

Kush R Patel 2203051050912 Page 10


Faculty of Engineering & Technology
Subject Name : STQA Laboratory
Subject Code : 303105378
B.Tech CSE : Year 4th Semester 7th

Decryption Process –
Step – 1 :-

Kush R Patel 2203051050912 Page 11


Faculty of Engineering & Technology
Subject Name : STQA Laboratory
Subject Code : 303105378
B.Tech CSE : Year 4th Semester 7th

Kush R Patel 2203051050912 Page 12

You might also like