Parul University
FACULTY OF ENGINEERING AND TECHNOLOGY
BACHELOR OF TECHNOLOGY
(303105342)
VII SEMESTER
Computer Science & Engineering Department
Laboratory Manual
Session 2024-25
Faculty of Engineering & Technology
Subject Name : CS Laboratory
Subject Code : 303105342
B.Tech CSE Year 4th Semester 7th
CERTIFICATE
This is to Certify that
Mr./Ms. ㅤㅤㅤㅤㅤ Kush Rakesh Patel ㅤ ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ
With enrolment no. ㅤ 2203051050912 has successfully completed his/her
Laboratory experiments in Cyber Security From the
department of ㅤㅤㅤ COMPUTER SCIENCE AND ENGINEERING ㅤ ㅤㅤ during the
academic year 2025 - 2026 ㅤㅤ
Date of Submission : ………………………. Staff In Charge: ……………………….
Head of department: ……………………….
Faculty of Engineering & Technology
Subject Name : STQA Laboratory
Subject Code : 303105378
B.Tech CSE : Year 4th Semester 7th
TABLE OF CONTENT
Page No
Sr. Date of Marks (out
Experiment Title Sign
No Completion of 10)
From To
1. Implementation to gather
information from any PC’s
connected to the LAN using
whois, portscanners, network
scanning, Angry IP scanners etc.
2. Experiments with open
source firewall/proxy
packageslike iptables,squid
etc.
3.
Implementation of Steganography.
4. Implementation of MITM- attack
using wireshark / network sniffers.
Implementation of
5.
Windowssecurity using firewalls
and other tools.
6. Implementation to identify web
vulnerabilities, using OWASP project.
7. Implementation of IT Audit,
malware analysis and
Vulnerability assessment and
generate the report.
8. Implementation of OS hardening
and RAM dump analysisto collect
the Artifacts and other Information.
9. Implementation of Mobile Audit
and generate the report of the
existing Artifacts.
10. Implementation of Cyber
Forensicstoolsfor Disk Imaging,
Data acquisition, Data extraction
and Data Analysis and recovery.
Kush R Patel 2203051050912 Page 3
Faculty of Engineering & Technology
Subject Name : STQA Laboratory
Subject Code : 303105378
B.Tech CSE : Year 4th Semester 7th
Practical – 1
Aim :- Implementation to gather information from any PC’s connected to the LAN using who.is, port
scanners, network scanning, Angry IP scanners etc.
Theory :-
1. Who.is
whois search for an object in a WHOIS database. WHOIS is a query and response protocol that is
widely used for querying databases that store the registered users of an Internet resource, such as a
domain name or an IP address block but is also used for a wider range of other information. Most
modern versions of whops try to guess the right server to ask for the specified object. If no guess can
be made, whops will connect to whops.networksolutions.com for NIC handles or whops.arin.net for
IPv4 addresses and network names.
Examples: Obtaining the domain WHOIS record for computer solutions.com WHOIS record by
IP querying Querying WHOIS in google search engine
Implementation
Step – 1: search who.is in web browser
Step – 2: Enter the domain name or IP address
Kush R Patel 2203051050912 Page 4
Faculty of Engineering & Technology
Subject Name : STQA Laboratory
Subject Code : 303105378
B.Tech CSE : Year 4th Semester 7th
Step – 3: Output
2. Port Scanners
Nmap is convenient during penetration testing of networked systems. Nmap provides the network
details, and also helps to determine the security flaws present in the system. Nmap is platform-
independent and runs on popular operating systems such as Linux, Windows and Mac.
Nmap is a useful tool for network scanning and auditing purposes
It can search for hosts connected to the Network.
It can search for free ports on the target host.
It detects all services running on the host with the help of operating system.
It also detects any flaws or potential vulnerabilities in networked systems.
Implementation :
Step – 1: Install Nmap in Windows
Step – 2: Open Nmap
Kush R Patel 2203051050912 Page 5
Faculty of Engineering & Technology
Subject Name : STQA Laboratory
Subject Code : 303105378
B.Tech CSE : Year 4th Semester 7th
Step – 3: Open command prompt and give command ipconfig to see local network
Step 4: Paste ip address in target select scan type and press scan button.
Output :
Kush R Patel 2203051050912 Page 6
Faculty of Engineering & Technology
Subject Name : STQA Laboratory
Subject Code : 303105378
B.Tech CSE : Year 4th Semester 7th
Step 5: Open Command prompt Run as administrator.
3. Angry IP Scanner
The good thing about Angry IP Scanner is that it lets you scan IP addresses in three different ways.
They are, the range you specified, a random IP address or a list of IP addresses from a text file. You
can easily select the scan mode from the drop-down menu next to the IP address field.
Kush R Patel 2203051050912 Page 7
Faculty of Engineering & Technology
Subject Name : STQA Laboratory
Subject Code : 303105378
B.Tech CSE : Year 4th Semester 7th
Practical – 3
Kush R Patel 2203051050912 Page 8
Faculty of Engineering & Technology
Subject Name : STQA Laboratory
Subject Code : 303105378
B.Tech CSE : Year 4th Semester 7th
Aim :- Implementation of Steganography.
Theory :-
Steganography is the practice of hiding secret information within another non-secret medium (like images,
audio, or video) such that the existence of the information is concealed. The primary goal is to prevent
detection of hidden data rather than protect the content itself.
Unlike encryption, which makes data unreadable to unauthorized users, steganography hides the existence
of data altogether.
Implementation :-
1. Preparation :
Identify the secret data (text, file, document, etc.).
Select a cover image that will carry the hidden data.
Optionally, set an encryption password to further secure the hidden data.
2. Embedding Phase :
Open OpenStego → Select Data Hiding mode.
Upload the cover image.
Select the secret file to hide.
Specify output path for the stego-image (image with hidden data).
Enter a password if encryption is desired.
Execute the embedding process.
3. Extraction Phase :
Open OpenStego → Select Extract Data mode.
Provide the stego-image.
Input the password if encryption was applied.
Extract the hidden file to a desired location.
Output :-
Encryption Process -
Kush R Patel 2203051050912 Page 9
Faculty of Engineering & Technology
Subject Name : STQA Laboratory
Subject Code : 303105378
B.Tech CSE : Year 4th Semester 7th
Step – 1 :-
Step – 2 :-
Step – 3 :-
Kush R Patel 2203051050912 Page 10
Faculty of Engineering & Technology
Subject Name : STQA Laboratory
Subject Code : 303105378
B.Tech CSE : Year 4th Semester 7th
Decryption Process –
Step – 1 :-
Kush R Patel 2203051050912 Page 11
Faculty of Engineering & Technology
Subject Name : STQA Laboratory
Subject Code : 303105378
B.Tech CSE : Year 4th Semester 7th
Kush R Patel 2203051050912 Page 12