Web cryptography assessment | My Assignment Tutor

Lab: SSL/TLS Tunnelling                                                                                      In this lab we will investigate the usage of SSL/TLS. 1                Web cryptography assessment The ssllabs tool (https://ssllabs.com) can be used to assess the security of the cryptography used on a Web site. You will be given a range of Web sites to scan in the lab, and you should pick three sites from the list. Now perform a test on them, and determine: SiteSite 1:Site 2:What grade does the site get?https://altoromutual.com/https://portal.hct.ac.ae/Pages/default.aspxThe digital certificate key size and type?  Does the name of the site match the name on the server?  Who is the signer of the digital certificate?  The expiry date on the digital certificate?  What is the hashing method on the certificate?  If it uses RSA keys, what is the e value that is used in the encryption (Me mod N)?  Determine a weak cipher suite used and example why it might be weak?  Is SSL v2 supported?   If SSL v2 was supported, what problems might there be with the site (this will require some research)?  Which versions of SSL/TSL are supported?  Is the site vulnerable to Heartbleed? Is the site vulnerable to DROWN? Is the site vulnerable to BEAST? Is the site vulnerable to POODLE?   Research questions:   If a site gets a ‘T’ grade, what is the problem?     If the site was susceptible to Poodle, what is the actual vulnerability?       What does TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 identify?       If SSL v2 is supported, how is the server likely to be vulnerable? 2                Viewing details NoDescriptionResult1Go to your Kali Linux instance. Run Wireshark and capture traffic from your main network connection. Start a Web browser, and go to www.napier.ac.uk.  Your IP address and TCP port:  Napier’s Web server IP address and TCP port: Stop Wireshark and identify some of your connection details:   Right-click on the GET HTTP request from the client, and follow the stream:  What does the red and blue text identify?  Can you read the HTTP requests that go from the client to the server? [Yes][No]3Go to your Kali Linux instance. Run Wireshark and capture traffic from your main network connection. Start a Web browser, and go to Google.com.  Your IP address and TCP port:  Google’s Web server IP address and TCP port: Stop Wireshark and identify some of your connection details:   Which SSL/TLS version is used:  By examining the Wireshark trace, which encryption method is used for the tunnel:  By examining the Wireshark trace, which hash method is used for the tunnel:  By examining the Wireshark trace, what is the length of the encryption key:   By examining the certificate from the browser which encryption method is used for the tunnel:   By examining the certificate from the browser, which hash method is used for the tunnel:   By examining the certificate from the browser is the length of the encryption key:4Run Wireshark and capture traffic from your main network connection. Start a Web browser, and go to https://twitter.com.   Stop Wireshark and identify some of your connection details:  Your IP address and TCP port:   Twitter’s Web server IP address and TCP port: Which SSL/TLS version is used: By examining the Wireshark trace, which encryption method is used for the tunnel:   By examining the Wireshark trace, which hash method is used for the tunnel:   By examining the Wireshark trace, what is the length of the encryption key:   By examining the certificate from the browser which encryption method is used for the tunnel:   By examining the certificate from the browser, which hash method is used for the tunnel:     By examining the certificate from the browser is the length of the encryption key: OpenSSL NoDescriptionResult1Go to your Kali Linux instance, and make a connection to the www.live.com Web site:   openssl s_client -connect www.live.com:443  Which SSL/TLS method has been used:   Which method is used on the encryption key on the certificate, and what is the size of the public key?     Which is the handshaking method that has been used to create the encryption key?     Which TLS version is used for the tunnel? Which encryption method is used for the tunnel: Which hash method is used for the tunnel: What is the length of the encryption key:   What is the serial number of the certificate:     Who has signed the certificate: 3        Examining traces NoDescriptionResult1Download the following file, and examine the trace with Wireshark:   http://asecuritysite.com/log/ssl.zip  Client IP address and TCP port:   Web server IP address and TCP port: Which SSL/TLS method has been used: Which encryption method is used for the tunnel: Which hash method is used for the tunnel: What is the length of the encryption key:2Download the following file, and examine the trace with Wireshark:   http://asecuritysite.com/log/https.zip  Client IP address and TCP port:   Web server IP address and TCP port: Which SSL/TLS method has been used: Which encryption method is used for the tunnel:   Which hash method is used for the tunnel:   What is the length of the encryption key:2Download the following file, and examine the trace with Wireshark:   http://asecuritysite.com/log/heart.zip  Client IP address and TCP port:   Web server IP address and TCP port:   Which SSL/TLS method has been used:   Which encryption method is used for the tunnel: Which hash method is used for the tunnel: What is the length of the encryption key:   Can you spot the packet which identifies the Heartbleed vulnerability?   Determine one of the encryption and hashing methods that the client wants to use:     Now determine the encryption and hashing methods that are agreed in the ISAKMP:

QUALITY: 100% ORIGINAL PAPER – NO PLAGIARISM – CUSTOM PAPER

Leave a Reply

Your email address will not be published. Required fields are marked *