0% found this document useful (0 votes)
283 views

2.5.2.6 Packet Tracer - Exploring File and Data Encryption

The document discusses encrypting and transferring confidential files between devices located in different regions over an FTP server. It provides steps to access FTP account credentials for two users, upload an encrypted file from one device to the FTP server, download the file to another device, and decrypt the file contents.

Uploaded by

SMK Limboro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
283 views

2.5.2.6 Packet Tracer - Exploring File and Data Encryption

The document discusses encrypting and transferring confidential files between devices located in different regions over an FTP server. It provides steps to access FTP account credentials for two users, upload an encrypted file from one device to the FTP server, download the file to another device, and decrypt the file contents.

Uploaded by

SMK Limboro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Packet Tracer – Exploring File and Data Encryption

Addressing Table

Private IP Public IP
Device Address Address Subnet Mask Site

FTP/Web Server 10.44.1.254 209.165.201.3 255.255.255.0 Metropolis Bank HQ


Mary 10.44.3.101 N/A 255.255.255.0 Healthcare at Home
Bob 10.44.1.3 N/A 255.255.255.0 Metropolis Bank HQ

Objectives
Part 1: Locate the FTP Account Credentials for Mary’s Laptop
Part 2: Upload Confidential Data using FTP
Part 3: Locate the FTP Account Credentials for Bob’s PC
Part 4: Download Confidential Data using FTP
Part 5: Decrypt the Contents of the clientinfo.txt File

Background
In this activity, you will access the encrypted contents of multiple files and transfer a file across the Internet to
a centralized FTP server. Another user will then download the file from the FTP server and decrypt the files’
contents. The IP addressing, network configuration, and service configurations are already complete. You will
use the client devices in the differing geographic regions to transfer a file with encrypted data to another
device.

Part 1: Locate the FTP Account Credentials for Mary’s Laptop

Step 1: Access the text document on Mary’s laptop.


a. Click the Healthcare at Home site and then click the laptop Mary.
b. Click the Desktop tab and then click Text Editor.
c. In the Text Editor window, click File > Open.
d. Click the document ftplogin.txt and click OK.

Step 2: Decrypt Mary’s FTP account information.


a. Highlight all the text from the ftplogin.txt file and copy it.
b. Open a web browser on your personal computer and browse to the website https://encipher.it
c. Click the whitespace on the right of the website and paste in the encrypted text.
Click the Decipher It button and use the decryption password maryftp123 to decrypt the encrypted text.
Click Decrypt.
What is the username and password for Mary’s FTP account?
____________________________________________________________________________________

© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 4
Packet Tracer – Exploring File and Data Encryption

Part 2: Upload Confidential Data using FTP

Step 1: View the confidential document on Mary’s Laptop.


a. Click the Healthcare at Home site and then click the Laptop Mary.
b. Click the Desktop tab and then click Text Editor.
c. In the Text Editor window, click File > Open.
d. Click on the document clientinfo.txt and click OK.
What form is the data in?
____________________________________________________________________________________

Step 2: Remotely connect to the FTP server.


a. Within the Healthcare at Home site, click the Laptop Mary.
b. Click the Desktop tab and then click Command Prompt.
c. Connect to the FTP/Web server at Metropolis Bank HQ by entering ftp 209.165.201.3 in the command
prompt.
d. Enter the username/password credentials located in Part 1 Step 2

Step 3: Upload a file to the FTP server.


a. At the ftp> prompt, enter the command dir to view the current files stored on the remote FTP server.
b. Mary has a file containing encrypted healthcare client information. Upload the clientinfo.txt file to the
FTP server by entering the command put clientinfo.txt.
c. At the ftp> prompt, enter the command dir and verify the clientinfo.txt file is now on the FTP server.
If cyber criminals were to capture the file transfer crossing the Internet, what would be in clear text?
____________________________________________________________________________________

Part 3: Locate the FTP Account Credentials for Bob’s PC

Step 1: Access the text document on Bob’s PC.


a. Click the Metropolis Bank HQ site and then click the PC Bob.
b. Click the Desktop tab and then click Text Editor.
c. In the Text Editor window, click File > Open.
d. Click the document ftplogin.txt and click OK.

Step 2: Decrypt Bob’s FTP account information.


a. Highlight all the text from ftplogin.txt file and copy it.
b. Open a web browser on your personal computer and browse to the website https://encipher.it
c. Click the whitespace on the right of the website and paste in the encrypted text.
d. Click Decipher It button and use the decryption password bobftp123 to decrypt the encrypted text. Click
Decrypt.

© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 4
Packet Tracer – Exploring File and Data Encryption

What is the username and password for Bob’s FTP account?


____________________________________________________________________________________

Part 4: Download Confidential Data using FTP

Step 1: Remotely connect to the FTP server.


a. Within the Metropolis Bank HQ site, click the PC Bob.
b. Click the Desktop tab and then click Command Prompt.
c. Connect to the FTP/Web server within the Metropolis Bank HQ by entering ftp 10.44.1.254 in the
command prompt.
d. Enter the username/password credentials located in Part 3 Step 2

Step 2: Download the file to Bob’s PC.


a. At the ftp> prompt, enter the command dir to view the current files stored on the remote FTP server.
b. Mary had uploaded the clientinfo.txt file containing encrypted healthcare client information.
Download the clientinfo.txt file to Bob’s PC by entering the command get clientinfo.txt.
c. At the ftp> prompt, enter the command quit.
d. At the PC> prompt, enter the command dir and verify the clientinfo.txt file is now Bob’s PC.
If cyber criminals were to capture the file transfer crossing the Internet, what would be in clear text?
____________________________________________________________________________________

Part 5: Decrypt the Contents of the clientinfo.txt File

Step 1: Receive the decryption key from Mary.


a. Within the Metropolis Bank HQ site, click the PC Bob.
b. Click the Desktop tab and then click Email.
c. In the Email window, click Receive.
d. Click on the Email with the subject “Decryption Key” and record the decryption key below.
What is the decryption key to access the confidential information in the clientinfo.txt file?
____________________________________________________________________________________

Step 2: Decrypt the contents of the clientinfo.txt file.


a. Within the Metropolis Bank HQ site, click the PC Bob.
b. Click the Desktop tab and then click Text Editor.
c. In the Text Editor window, click File > Open.
d. Click the document clientinfo.txt and click OK.
e. Highlight all the text from the clientinfo.txt file and copy it.
f. Open a web browser on your personal computer and browse to the website https://encipher.it
g. Click the whitespace on the right of the website and paste in the encrypted text.

© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 4
Packet Tracer – Exploring File and Data Encryption

Click Decipher It button and use the decryption password from Mary’s email to decrypt the encrypted
text. Click Decrypt.
What is the first account name in the clientinfo.txt file?
____________________________________________________________________________________

Suggested Scoring Rubric

Question Possible Earned


Activity Section Location Points Points

Part 1: Locate the FTP account credentials for


Mary’s laptop Step 2 2
Step 1 2
Part 2: Upload confidential data using FTP
Step 3 2
Part 3: Locate the FTP account credentials for
Bob’s PC Step 2 2
Part 4: Download confidential data using FTP Step 2 2
Part 5: Decrypt the contents of the clientinfo.txt file Step 1 2
Step 2 2
Questions 14
Packet Tracer Score 86
Total Score 100

© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 4

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy