LAB Requirements at the Centres for Conduct of Practical Examination of M.Sc (IT) Sem III

LAB Requirements at the Centres for Conduct of Practical Examination of M.Sc (IT) Sem III

LAB Requirements at the centres for conduct of Practical Examination of M.Sc (IT) Sem III S.NO COURSE COURSE NAME SOFTWARES / MIN HW CODE HARDWRE REQUIRED REQUIRED 1 PSIT3P1 EMBEDDED SYSTEMS 1. Keil Software & flash 1. EDI kits 89S51 Magic, PGM Microcontroler with interface cards 2. Keil Software & 2. KEIL flash Magic, PGM, Crosswire Compiler 3. no hardware 3. PROTUEUS, codevision AVR, EDSIM, Crosswire Compiler 2 PSIT3P2 INFORMATION SECURITY Wireshark, PCs with min 3-4 MANAGEMENT Openssl & apache on GB RAM centos/redhat, Gpg4win, Library crypto++ with ubuntu, Redhat/ubuntu/centos, MS outlook, firefox Gcc with ubuntu, Nmap-zenmap gui, Java sdk 3 PSIT3P3a VIRTUALIZATION Vmware, UCS, citrix PCs with min4 GB Zen, HyperV, RAM navisphere, nexus (installed in virtual machine) 4 PSIT3P4b ARTIFICIAL NEURAL MATLAB / R NETWORKS PSIT3P4a DIGITAL IMAGE MATLAB / R or very PROCESSING few might have done in C/C++ /JAva PSIT3P4b ETHICAL HACKING PCs with min 3-4 GB RAM Practical 1 Practical 2 Traceroute Advanced IP Scanner Ping Utility Amap, Nmap nslookup CurrPorts Tool SmartWhois GFI LanGuard 2012 eMailTrackerPro LANSurveyor,Nessus, HTTPort HTTrack Web Site Copier MegaPing, GCZapper Search Diggity Colasoft Packet Builder, The Dude Practical 3 Practical 4 Nmap, SuperScan LCP, NTFS Streams NetBIOS Enumerator Tool ADS Spy, Stealth Files Tool SoftPerfect Network Scanner RainbowCrack, LOphtCrack SolarWinds Toolset(Windows SNMP Agent Ophcrack, Snow, CHNTPW.ISO installed on Victim & attacker machine) QuickStego Hyena Practical 5 Practical 6 ProRat Tool, One File EXE Maker Colasoft Packet Builder HTTP Trojan, Theef OmniPeek Network Analyzer Biodox, MoSucker, Metasploit Wireshark, Cain & Abel, SnifCOCMatic, Colasoft Network Analyzer, WinArpAttacker, SMAC Practical 7 Practical 9 hping3, DoSHTTP httprecon tool, ID Serve tool Metasploit Framework Java 7 Update 6 on Victim Machine. Practical 8 ZAP Practical 10 Practical 11 Blind SQL Injection AirPcap with Wireshark IBM Security AppScan, WebCruiser AircrackCng NCStalker Web Application Security Scanner OmniPeek Network Analyzer 2012, XAMPP with Damn Vulnerable Web Kali Linux on a Laptop. Application installed. Wireless Access Point with WEP Key set. Practical 12 Practical 13 HashCalc, MD5 Calculator, Advanced Snort, Encryption package, TrueCrypt KFSensor Honeypot IDS HTTPort CrypTool, BCTextEncoder, Rohos Disk Encryption For Both EH and ISM practical’s 3 virtual machines are needed Virtual Machine 1 (EH Attacker) OS: Windows RAM: 2 GB Software: All the software of EH practical’s installed into it. .Net Framework up to latest version Virtual Machine 2 (EH Victim) OS: Windows RAM: 2 GB Software: EH Practical’s software setups should be copied onto it. Java 7 Update 6. Virtual Machine 3 (For EH and ISM Linux Pracs) OS: Ubuntu (Any latest version) RAM: 2 GB Software: Apache2, GCC, Crypto, Java, crypto libraries, hping3 should be installed. .

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    3 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us