Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

1.

SMTP (Simple Mail Transfer Protocol) is the standard protocol for transferring mail between
hosts over TCP. A TCP connection is set up between a user agent and a server program. The
server listens on TCP port 25 for incoming connection requests. The user end of the connection is
on a TCP port number above 1023. Suppose you wish to build a packet filter rule set allowing
inbound and outbound SMTP traffic. generate the following ruleset.
2. Demonstrate Instrusion detection system using Snort tool.

3. Demonstrate how to provide secure data storage, secure data transmission and for creating
digital signatures (GnuPG).
4. Implementation of DES algorithm for data encryption at Round1.

5. Setup a honey pot and monitor the honeypot on network (KF Sensor) .
6. Observe the value of the opcode field within the ARP payload path of the Ethernet in which an
ARP results and response is made.

7. Perform an experiment for port scanning with nmap


8. Generating Password Hashes With Openssl

9. Using nmap 1)find open ports on a system 2) find the machines which are active 3)find the
version of remote os on other systems 4)find the version of s/w installed on other system
10. Performa An Experiment To Demonstrate How To Sniff For Router Traffic By Using The Tool
Wireshark.

11. To study the prevention mechanisms to protect one’s PC from Hackers.


12. C program for the Implementation Of RSA Algorithm Encrypt the text data and Decrypt the same

13. Implementation of DES algorithm for data decryption at Round16.


14. Provide screenshot for Tcp stream where it shows username and password.

15. How to sniff passwords in wireshark ,provide a screenshot.


16. Show the result of passing 000000 through S-box 7

17. Exploit format string vulnerability on view aribitary memory locations.


18. If the key with parity bit (64 bits) is 0123 ABCD 2562 1456, find the first round key.
19. Demonstrate how to use OpenSSL to generate the certificates.
20. Examine the DNS query message and response message and provide screen shot.

21. Implement code injection and execution to understand the Buffer Overflow.
22. Exploit format string vulnerability on view aribitary memory locations.

23. If the key with parity bit (64 bits) is 0123 ABCD 2562 1456, find the first round key.
24. Demonstrate how to install Snort from rules and perform basic testing.

25. Exploit format string vulnerability on view aribitary memory locations.


26. Show the result of passing 110111 through S-box 3.

27. Show the results of the following hexadecimal data AAAA BBBB CCCC DDDD after passing it
through the final permutation box.
28. Write pseudocode for the exclusiveOr routine used in DES.

29. If the key with parity bit (64 bits) is 0123 ABCD 2562 1456, find the first round key.
30. Write pseudocode for the exclusiveOr routine used in DES.

INTERNAL EXAMINER EXTERNAL EXAMINER

You might also like