Professional Documents
Culture Documents
Cs Project
Cs Project
Cs Project
SUBMITTED TO SUBMITTED BY
MR DHARMENDRA SINGH CHINTAN GARG
COLLEGE ROLL NO -16548
EXAMINATION ROLL NO: 21003557020
1. Demonstrate the use of Network tools: ping, ifconfig, whois.
Ping
Ifconfig
whois
2. Perform encryption and decryption of Caesar cipher. Write a script for performing these
Operations
Code
Output
3. Perform encryption and decryption of a Rail fence cipher. Write a script for performing these
operations.
Code Output
4. Use Burp proxy to capture and modify the message.
Captured request
Modified request
5. Demonstrate sending of a protected word document.
Step5: Click "OK" to save the password and protect the document.
Step6: Save the document and then attach it to an email or upload it to a file-sharing service like Dropbox or
Google Drive.
Step7: When sending the email or sharing the file, be sure to provide the recipient with the password that you
set to protect the document.
By following these steps, you can ensure that the Word document you are sending is protected and can only be
accessed by those who have the password.
6. Demonstrate sending of a protected worksheet.
Step1: Open the Excel workbook containing the worksheet you want to protect.
Step3: Click the "Review" tab on the ribbon at the top of the screen.
Step5: In the "Protect Sheet" dialog box, select the options you want to apply, such as allowing users to select
locked cells or enter data in unlocked cells.
Step7: Click "OK" to apply the protection settings and lock the worksheet.
Step8: Save the workbook.
To send the protected worksheet, open a new email message in your email client and attach the Excel workbook
file.
If you want to share the password with the recipient, include it in the email message. Alternatively, you can
share the password with the recipient by phone or in person.
7. Demonstrate use of steganography tools
Firstly, upload over image and secret file and then download the encrypted file as shown below: