当前位置:首页 » 安全设置 » 很经典网络安全实验
扩展阅读
无线网络的局域网 2025-03-15 18:52:26

很经典网络安全实验

发布时间: 2022-02-01 19:52:50

1. 求《网管员必读-网络安全》《网管员必读:网络测试监控和实验》这两本书的下载地址,任何格式都可以

网管员必读-网络安全:http://ishare.iask.sina.com.cn/search.php?key=%CD%F8%B9%DC%D4%B1%B1%D8%B6%C1%A3%AD%CD%F8%C2%E7%B0%B2%C8%AB&format=
网管员必读:网络测试监控和实验:http://ishare.iask.sina.com.cn/search.php?key=%CD%F8%C2%E7%B2%E2%CA%D4%BC%E0%BF%D8%BA%CD%CA%B5%D1%E9&format=

很遗憾,没有找到完全相同的书名。选择不需要积分的,文件大一点的可能更全一些。如果下载需要积分的话,自己注册一个用户,就两分钟的时间,注册后就有积分啦。假如我的回答对你有用,请别忘了采纳。

2. 关于网络安全技术的实验-IP欺骗。。这个实验需要用到什么工具,,步骤有哪些怎么做,,有大神知道

不知道你的基础怎么样,起码要了解集线器,交换机,路由器原理,了解透明网桥怎么学习mac地址,和广播是什么概念,ip寻址原理,了解tcp/ip协议族,ip头的封装格式等等 要不然告诉你了你也根本看不懂

3. 网络信息安全实验

C语言编写的一个DES加密源程序如下,不解释,自己慢慢看:
C语言编写的一个DES加密源程序如下,不解释,自己慢慢看:
#include <stdio.h>
#include <time.h>
#include <stdlib.h>
#include <memory.h>
#define PLAIN_FILE_OPEN_ERROR -1
#define KEY_FILE_OPEN_ERROR -2
#define CIPHER_FILE_OPEN_ERROR -3
#define OK 1;
typedef char ElemType;
int IP_Table[64] = { 57,49,41,33,25,17,9,1,
59,51,43,35,27,19,11,3,
61,53,45,37,29,21,13,5,
63,55,47,39,31,23,15,7,
56,48,40,32,24,16,8,0,
58,50,42,34,26,18,10,2,
60,52,44,36,28,20,12,4,
62,54,46,38,30,22,14,6};
int IP_1_Table[64] = {39,7,47,15,55,23,63,31,
38,6,46,14,54,22,62,30,
37,5,45,13,53,21,61,29,
36,4,44,12,52,20,60,28,
35,3,43,11,51,19,59,27,
34,2,42,10,50,18,58,26,
33,1,41,9,49,17,57,25,
32,0,40,8,48,16,56,24};
int E_Table[48] = {31, 0, 1, 2, 3, 4,
3, 4, 5, 6, 7, 8,
7, 8,9,10,11,12,
11,12,13,14,15,16,
15,16,17,18,19,20,
19,20,21,22,23,24,
23,24,25,26,27,28,
27,28,29,30,31, 0};
int P_Table[32] = {15,6,19,20,28,11,27,16,
0,14,22,25,4,17,30,9,
1,7,23,13,31,26,2,8,
18,12,29,5,21,10,3,24};
int S[8][4][16] =/* S1 */
{{{14,4,13,1,2,15,11,8,3,10,6,12,5,9,0,7},
{0,15,7,4,14,2,13,1,10,6,12,11,9,5,3,8},
{4,1,14,8,13,6,2,11,15,12,9,7,3,10,5,0},
{15,12,8,2,4,9,1,7,5,11,3,14,10,0,6,13}},
/* S2 */
{{15,1,8,14,6,11,3,4,9,7,2,13,12,0,5,10},
{3,13,4,7,15,2,8,14,12,0,1,10,6,9,11,5},
{0,14,7,11,10,4,13,1,5,8,12,6,9,3,2,15},
{13,8,10,1,3,15,4,2,11,6,7,12,0,5,14,9}},
/* S3 */
{{10,0,9,14,6,3,15,5,1,13,12,7,11,4,2,8},
{13,7,0,9,3,4,6,10,2,8,5,14,12,11,15,1},
{13,6,4,9,8,15,3,0,11,1,2,12,5,10,14,7},
{1,10,13,0,6,9,8,7,4,15,14,3,11,5,2,12}},
/* S4 */
{{7,13,14,3,0,6,9,10,1,2,8,5,11,12,4,15},
{13,8,11,5,6,15,0,3,4,7,2,12,1,10,14,9},
{10,6,9,0,12,11,7,13,15,1,3,14,5,2,8,4},
{3,15,0,6,10,1,13,8,9,4,5,11,12,7,2,14}},
/* S5 */
{{2,12,4,1,7,10,11,6,8,5,3,15,13,0,14,9},
{14,11,2,12,4,7,13,1,5,0,15,10,3,9,8,6},
{4,2,1,11,10,13,7,8,15,9,12,5,6,3,0,14},
{11,8,12,7,1,14,2,13,6,15,0,9,10,4,5,3}},
/* S6 */
{{12,1,10,15,9,2,6,8,0,13,3,4,14,7,5,11},
{10,15,4,2,7,12,9,5,6,1,13,14,0,11,3,8},
{9,14,15,5,2,8,12,3,7,0,4,10,1,13,11,6},
{4,3,2,12,9,5,15,10,11,14,1,7,6,0,8,13}},
/* S7 */
{{4,11,2,14,15,0,8,13,3,12,9,7,5,10,6,1},
{13,0,11,7,4,9,1,10,14,3,5,12,2,15,8,6},
{1,4,11,13,12,3,7,14,10,15,6,8,0,5,9,2},
{6,11,13,8,1,4,10,7,9,5,0,15,14,2,3,12}},
/* S8 */
{{13,2,8,4,6,15,11,1,10,9,3,14,5,0,12,7},
{1,15,13,8,10,3,7,4,12,5,6,11,0,14,9,2},
{7,11,4,1,9,12,14,2,0,6,10,13,15,3,5,8},
{2,1,14,7,4,10,8,13,15,12,9,0,3,5,6,11}}};
int PC_1[56] = {56,48,40,32,24,16,8,
0,57,49,41,33,25,17,
9,1,58,50,42,34,26,
18,10,2,59,51,43,35,
62,54,46,38,30,22,14,
6,61,53,45,37,29,21,
13,5,60,52,44,36,28,
20,12,4,27,19,11,3};
int PC_2[48] = {13,16,10,23,0,4,2,27,
14,5,20,9,22,18,11,3,
25,7,15,6,26,19,12,1,
40,51,30,36,46,54,29,39,
50,44,32,46,43,48,38,55,
33,52,45,41,49,35,28,31};
int MOVE_TIMES[16] = {1,1,2,2,2,2,2,2,1,2,2,2,2,2,2,1};
int ByteToBit(ElemType ch,ElemType bit[8]);
int BitToByte(ElemType bit[8],ElemType *ch);
int Char8ToBit64(ElemType ch[8],ElemType bit[64]);
int Bit64ToChar8(ElemType bit[64],ElemType ch[8]);
int DES_MakeSubKeys(ElemType key[64],ElemType subKeys[16][48]);
int DES_PC1_Transform(ElemType key[64], ElemType tempbts[56]);
int DES_PC2_Transform(ElemType key[56], ElemType tempbts[48]);
int DES_ROL(ElemType data[56], int time);
int DES_IP_Transform(ElemType data[64]);
int DES_IP_1_Transform(ElemType data[64]);
int DES_E_Transform(ElemType data[48]);
int DES_P_Transform(ElemType data[32]);
int DES_SBOX(ElemType data[48]);
int DES_XOR(ElemType R[48], ElemType L[48],int count);
int DES_Swap(ElemType left[32],ElemType right[32]);
int DES_EncryptBlock(ElemType plainBlock[8], ElemType subKeys[16][48], ElemType cipherBlock[8]);
int DES_DecryptBlock(ElemType cipherBlock[8], ElemType subKeys[16][48], ElemType plainBlock[8]);
int DES_Encrypt(char *plainFile, char *keyStr,char *cipherFile);
int DES_Decrypt(char *cipherFile, char *keyStr,char *plainFile);
int ByteToBit(ElemType ch, ElemType bit[8]){
int cnt;
for(cnt = 0;cnt < 8; cnt++){
*(bit+cnt) = (ch>>cnt)&1;
}
return 0;
}
/* 娴滃矁绻橀崚𨱍版祮阉广垺鍨氱€涙 濡?*/
int BitToByte(ElemType bit[8],ElemType *ch){
int cnt;
for(cnt = 0;cnt < 8; cnt++){
*ch |= *(bit + cnt)<<cnt;
}
return 0;
}
int Char8ToBit64(ElemType ch[8],ElemType bit[64]){
int cnt;
for(cnt = 0; cnt < 8; cnt++){
ByteToBit(*(ch+cnt),bit+(cnt<<3));
}
return 0;
}
int Bit64ToChar8(ElemType bit[64],ElemType ch[8]){
int cnt;
memset(ch,0,8);
for(cnt = 0; cnt < 8; cnt++){
BitToByte(bit+(cnt<<3),ch+cnt);
}
return 0;
}
int DES_MakeSubKeys(ElemType key[64],ElemType subKeys[16][48]){
ElemType temp[56];
int cnt;
DES_PC1_Transform(key,temp);
for(cnt = 0; cnt < 16; cnt++){
DES_ROL(temp,MOVE_TIMES[cnt]);
DES_PC2_Transform(temp,subKeys[cnt]);
}
return 0;
}
int DES_PC1_Transform(ElemType key[64], ElemType tempbts[56]){
int cnt;
for(cnt = 0; cnt < 56; cnt++){
tempbts[cnt] = key[PC_1[cnt]];
}
return 0;
}
int DES_PC2_Transform(ElemType key[56], ElemType tempbts[48]){
int cnt;
for(cnt = 0; cnt < 48; cnt++){
tempbts[cnt] = key[PC_2[cnt]];
}
return 0;
}
int DES_ROL(ElemType data[56], int time){
ElemType temp[56];
memcpy(temp,data,time);
memcpy(temp+time,data+28,time);
memcpy(data,data+time,28-time);
memcpy(data+28-time,temp,time);
memcpy(data+28,data+28+time,28-time);
memcpy(data+56-time,temp+time,time);
return 0;
}
int DES_IP_Transform(ElemType data[64]){
int cnt;
ElemType temp[64];
for(cnt = 0; cnt < 64; cnt++){
temp[cnt] = data[IP_Table[cnt]];
}
memcpy(data,temp,64);
return 0;
}
int DES_IP_1_Transform(ElemType data[64]){
int cnt;
ElemType temp[64];
for(cnt = 0; cnt < 64; cnt++){
temp[cnt] = data[IP_1_Table[cnt]];
}
memcpy(data,temp,64);
return 0;
}
int DES_E_Transform(ElemType data[48]){
int cnt;
ElemType temp[48];
for(cnt = 0; cnt < 48; cnt++){
temp[cnt] = data[E_Table[cnt]];
}
memcpy(data,temp,48);
return 0;
}
int DES_P_Transform(ElemType data[32]){
int cnt;
ElemType temp[32];
for(cnt = 0; cnt < 32; cnt++){
temp[cnt] = data[P_Table[cnt]];
}
memcpy(data,temp,32);
return 0;
}
int DES_XOR(ElemType R[48], ElemType L[48] ,int count){
int cnt;
for(cnt = 0; cnt < count; cnt++){
R[cnt] ^= L[cnt];
}
return 0;
}
int DES_SBOX(ElemType data[48]){
int cnt;
int line,row,output;
int cur1,cur2;
for(cnt = 0; cnt < 8; cnt++){
cur1 = cnt*6;
cur2 = cnt<<2;
line = (data[cur1]<<1) + data[cur1+5];
row = (data[cur1+1]<<3) + (data[cur1+2]<<2)
+ (data[cur1+3]<<1) + data[cur1+4];
output = S[cnt][line][row];
data[cur2] = (output&0X08)>>3;
data[cur2+1] = (output&0X04)>>2;
data[cur2+2] = (output&0X02)>>1;
data[cur2+3] = output&0x01;
}
return 0;
}
int DES_Swap(ElemType left[32], ElemType right[32]){
ElemType temp[32];
memcpy(temp,left,32);
memcpy(left,right,32);
memcpy(right,temp,32);
return 0;
}
int DES_EncryptBlock(ElemType plainBlock[8], ElemType subKeys[16][48], ElemType cipherBlock[8]){
ElemType plainBits[64];
ElemType Right[48];
int cnt;
Char8ToBit64(plainBlock,plainBits);
DES_IP_Transform(plainBits);
for(cnt = 0; cnt < 16; cnt++){
memcpy(Right,plainBits+32,32);
DES_E_Transform(Right);
DES_XOR(Right,subKeys[cnt],48);
DES_SBOX(Right);
DES_P_Transform(Right);
DES_XOR(plainBits,Right,32);
if(cnt != 15){
DES_Swap(plainBits,plainBits+32);
}
}
DES_IP_1_Transform(plainBits);
Bit64ToChar8(plainBits,cipherBlock);
return 0;
}
int DES_DecryptBlock(ElemType cipherBlock[8], ElemType subKeys[16][48],ElemType plainBlock[8]){
ElemType cipherBits[64];
ElemType Right[48];
int cnt;
Char8ToBit64(cipherBlock,cipherBits);
DES_IP_Transform(cipherBits);
for(cnt = 15; cnt >= 0; cnt--){
memcpy(Right,cipherBits+32,32);
DES_E_Transform(Right);
DES_XOR(Right,subKeys[cnt],48);
DES_SBOX(Right);
DES_P_Transform(Right);
DES_XOR(cipherBits,Right,32);
if(cnt != 0){
DES_Swap(cipherBits,cipherBits+32);
}
}
DES_IP_1_Transform(cipherBits);
Bit64ToChar8(cipherBits,plainBlock);
return 0;
}
int DES_Encrypt(char *plainFile, char *keyStr,char *cipherFile){
FILE *plain,*cipher;
int count;
ElemType plainBlock[8],cipherBlock[8],keyBlock[8];
ElemType bKey[64];
ElemType subKeys[16][48];
if((plain = fopen(plainFile,"rb")) == NULL){
return PLAIN_FILE_OPEN_ERROR;
}
if((cipher = fopen(cipherFile,"wb")) == NULL){
return CIPHER_FILE_OPEN_ERROR;
}
memcpy(keyBlock,keyStr,8);
Char8ToBit64(keyBlock,bKey);
DES_MakeSubKeys(bKey,subKeys);
while(!feof(plain)){
if((count = fread(plainBlock,sizeof(char),8,plain)) == 8){
DES_EncryptBlock(plainBlock,subKeys,cipherBlock);
fwrite(cipherBlock,sizeof(char),8,cipher);
}
}
if(count){
memset(plainBlock + count,'\0',7 - count);
plainBlock[7] = 8 - count;
DES_EncryptBlock(plainBlock,subKeys,cipherBlock);
fwrite(cipherBlock,sizeof(char),8,cipher);
}
fclose(plain);
fclose(cipher);
return OK;
}
int DES_Decrypt(char *cipherFile, char *keyStr,char *plainFile){
FILE *plain, *cipher;
int count,times = 0;
long fileLen;
ElemType plainBlock[8],cipherBlock[8],keyBlock[8];
ElemType bKey[64];
ElemType subKeys[16][48];
if((cipher = fopen(cipherFile,"rb")) == NULL){
return CIPHER_FILE_OPEN_ERROR;
}
if((plain = fopen(plainFile,"wb")) == NULL){
return PLAIN_FILE_OPEN_ERROR;
}
memcpy(keyBlock,keyStr,8);
Char8ToBit64(keyBlock,bKey);
DES_MakeSubKeys(bKey,subKeys);
fseek(cipher,0,SEEK_END);
fileLen = ftell(cipher);
rewind(cipher);
while(1){
fread(cipherBlock,sizeof(char),8,cipher);
DES_DecryptBlock(cipherBlock,subKeys,plainBlock);
times += 8;
if(times < fileLen){
fwrite(plainBlock,sizeof(char),8,plain);
}
else{
break;
}
}
if(plainBlock[7] < 8){
for(count = 8 - plainBlock[7]; count < 7; count++){
if(plainBlock[count] != '\0'){
break;
}
}
}
if(count == 7){
fwrite(plainBlock,sizeof(char),8 - plainBlock[7],plain);
}
else{
fwrite(plainBlock,sizeof(char),8,plain);
}
fclose(plain);
fclose(cipher);
return OK;
}
int main()
{
DES_Encrypt("out.xml","key.txt","out.des");
DES_Decrypt("out.des","key.txt","out.des.xml");
return 0;
}

4. 哪有网络安全在线实验的平台

1.网络信息安全攻防学习平台
2.南京邮电大学网络攻防训练平台
直接网络就能找到(网络不给贴链接),简单注册下就可以使用,适合基础学习,实验题目很丰富。

5. 网络安全这个专业侧重哪方面

1.不会涉及到电路

2.信号与系统、信息论是两门主干课程,硬件多一些,也有很多和软件、数学交叉的部分

3.严格来说网络安全不是计算机科学的范畴,现在一般叫做信息安全,属于电子通信科学,所以应该有很多不同吧

4.大公司有专门的信息安全部门待遇很高

6. 有没有类似于实验楼关于网络安全的实验网站

有的 网络搜索 PKAV

7. 我在做网络安全实验,这次是使用万能密码攻击网站,完事后,有个课后题,不同环境的【万能密码】怎么设置

万能密码需要设置正规的网络安全环境才能使用。

8. 基于DETERLab的网络安全实验技术是什么意思,最好能提供相关的论文资料。

资料全是英文,看不懂啊。按我的理解就是一个网络安全实验平台。平台比较大,涉及到方方面面。在攻防实验室或者网络安全实验室,国内研究的还不是很深,目前国内的资料基本上都是对国外的研究资料生搬硬套的,并且国内主流的安全厂家,像天融信,启明,绿盟都没有真正意义的像
DETERLab这样的平台。不过据我了解,济南倒是有一家网络安全公司正在研发这个,不过不是基于DETERLab这样的大平台,而是通过虚拟话技术,通过底层开发的。如果研发出来,目前遇到的所有网络安全实验,都能实现,不管是网络攻击,web渗透还是汇编反汇编,都能完成,应该说是国内最好的。唯一不足的就是只能同时进行较少(几十个实验同时进行)的实验,因为通过虚拟化镜像的保存和调用。而DETERLab所有都可以同时进行,毕竟平台构成400多个相关硬件设备。这都是我了解的,也不知道对错,要是我说的不对的,你也跟我说说,咱们相互学习嘛。。至于资料,还真没有,等我找到了,大家一起分享一下。。

9. 中国哪个网络信息安全实验室最好

没有最好,只有更好。而且,你说的安全实验室是指那些可以做实验的网站?