CSCI 4174 NETWORK SECURITY-Assignment 5


  • 作业标题:CSCI 4174/CSCI 6708 NETWORK SECURITY: ASSIGNMENT NO. 5
  • 课程名称:Dalhouse University CSCI 4174 Network Security
  • 完成周期:3天

练习1

Exercise 1 (RSA Emulation): The objective of the exercise is to emulate the RSA algorithm. Your program must accept two prime numbers, p and q, and determine the public and private keys. Then it must accept a plaintext message, represented by an integer m, and determine the ciphertext c. It should then decrypt the ciphertext c to get back the original integer m. Your program should be implemented from first principles without using standard libraries for RSA.

。。。

练习2

Exercise 2: Simulation of Credential Stealing with a Phishing Attack
Credential Stealing is a major cyber-threat in which a victim’s identity is stolen to gain access to the victim’s systems and/or steal valuable information. One of the important ways in which credential stealing is carried out is social engineering such as phishing, in which hackers pose as a trusted organization and trick users to revealing confidential information.

Kali Linux has a pre-installed functionality called the Social Engineering Toolkit (SET) that can be used by
security professionals for testing different social engineering attacks. The objective of this exercise is to
simulate a phishing attack for credential stealing. You will create a Google phishing page using the SET.

。。。。

提交要求

Submission: A zip file containing the following: a) Source code for Exercise 1; b) Sample inputs/outputs for Exercise 1; c) Screenshots for Exercise 2; and d) Answers to Question 2 above for Exercise 2


文章作者: IT神助攻
版权声明: 本博客所有文章除特別声明外,均采用 CC BY 4.0 许可协议。转载请注明来源 IT神助攻 !
  目录