- 作业标题:CSCI 4174/CSCI 6708 NETWORK SECURITY: ASSIGNMENT NO. 5
- 课程名称:Dalhouse University CSCI 4174 Network Security
- 完成周期:3天
练习1
Exercise 1 (RSA Emulation): The objective of the exercise is to emulate the RSA algorithm. Your program must accept two prime numbers, p and q, and determine the public and private keys. Then it must accept a plaintext message, represented by an integer m, and determine the ciphertext c. It should then decrypt the ciphertext c to get back the original integer m. Your program should be implemented from first principles without using standard libraries for RSA.
。。。
练习2
Exercise 2: Simulation of Credential Stealing with a Phishing Attack
Credential Stealing is a major cyber-threat in which a victim’s identity is stolen to gain access to the victim’s systems and/or steal valuable information. One of the important ways in which credential stealing is carried out is social engineering such as phishing, in which hackers pose as a trusted organization and trick users to revealing confidential information.
Kali Linux has a pre-installed functionality called the Social Engineering Toolkit (SET) that can be used by
security professionals for testing different social engineering attacks. The objective of this exercise is to
simulate a phishing attack for credential stealing. You will create a Google phishing page using the SET.
。。。。
提交要求
Submission: A zip file containing the following: a) Source code for Exercise 1; b) Sample inputs/outputs for Exercise 1; c) Screenshots for Exercise 2; and d) Answers to Question 2 above for Exercise 2