Professional Documents
Culture Documents
App in Training Report
App in Training Report
The Industrial Training was in the field of Information Security and Ethical Hacking.
In the training the aim was to try and secure the System against unauthorized access.
For Data Security Many already existing tools were used, Windows Registry was
edited so as to boost the security of a System. Many functionalities of Windows OS
which are used by Hackers were explored and exploited .
In Ethical Hacking the ways to track down the Hacker’s identity and location were
experimented with that too wihout revealing your own identity.
Finally the focus was on the Cyber Laws in India w.r.t. hacking and phishing.
DETAILS:
Data Collected:-
o Working of a Web Server and Website.
o The Working of intruders:- How they attack to gain illegal access to data.
Analysis:
PHP is a server side language whereas Java Script is used on Client side, now in
general encryption is done on server side in php so as to store passwords etc. If we
send the data encrypted on client side itself it is more secure and safe to transfer.
So, we can encrypt the data (passwords and usernames) on client side using Java
Script wherein decrypting the same on Server side using PHP code for decryption.
We can use various Cryptographic Algorithms for the same, we used RSA Public Key
Cryptography for implementation on a Website.
Introduction:
1.)Key generation:-
RSA involves a public key and a private key. The public key can be known to
everyone and is used for encrypting messages. Messages encrypted with the public
key can only be decrypted using the private key. The keys for the RSA algorithm are
generated the following way:
The public key consists of the modulus n and the public (or encryption) exponent e.
The private key consists of the private (or decryption) exponent d which must be kept
secret.
Encryption:-
Sender A does the following:-
NOTE:
When representing the plaintext octets as the representative integer m, it is usual to add
random padding characters to make the size of the integer m large and less susceptible to
certain types of attack. If m = 0 or 1 or n-1 there is no security as the ciphertext has the same
value.
Decryption:-
Recipient B does the following:-
Signature verification:-
Recipient B does the following:-
Implementation in Project:
In the Project the RSA algorithm was implementated on a Website. There the
encryption of the data to be sent by user was done in javascript and the decryption on
the server side was implemented in PHP.
• Experiments Performed
DNS Server on Windows Server
Provides IP address to client that is braodcasting for IP address requisal over the
Network.
Relay Agent relay the request for an IP address from one DHCP server to other.
The centralized database structure that stores the information of user group and
objects.
Setup Domain Controller
SYSKEY password
File Encryption
Email ID Tracking
ICMP Broadcasting to see the running running services and there ports on a
remote system.