Error
  • JLIB_DATABASE_ERROR_FUNCTION_FAILED

i-SECURIT FAQ

Frequently Asked Question
1. What is the IP configuration for isecurit?
  • The IP address for 2 series is 192.168.2.*, Subnet mask is 255.255.255.0, Gateway is 192.168.2.121 and DNS is 192.168.2.121
  • The IP address for 10 series is 192.168.10.*, Subnet mask is 255.255.255.0, Gateway is 192.168.10.100 and DNS is 192.168.2.121
2. The CCU status is running but we are not able to ping the CCU from the client machine?
  • Check for the IP configuration for 2 series and 10 series
  • The IP address for 2 series is 192.168.2.*, Subnet mask is 255.255.255.0, Gateway is 192.168.2.121 and DNS is 192.168.2.12
  • The IP address for 10 series is 192.168.10.*, Subnet mask is 255.255.255.0, Gateway is 192.168.10.100 and DNS is 192.168.2.121
  • Check the continuity of RJ45 cable
3. The CCU status is running we are able to ping the CCU from the client machine but not able to access the main page?
  • Check whether the fire wall is switched OFF
  • Disable all the proxy settings in the appropriate browser
  • If the client PC is running on Windows XP SP2, disable the Windows Firewall settings
4. The CCU status displays a particular service is not responding, what is the solution?
  • The services can be restored by using the Control Panel Utility. Using the control Panel the user can activated or deactivated a particular service by using the start and stop button.
5. Do we need to shutdown the fire wall while we are connecting the machine to CCU?
  • Yes, we need to shutdown the firewall while we are connecting the client machine to the CCU.
6. The following screen appears after typing www.isecurit.edu in the browser, what is the solution?
Solution: Download Macromedia flash player plug-in for the browser
7. The following page is displayed when we open the Isecurit exercise pages?
Solution: Down load Java Run Time Version 1.5.0 update 2
8. JRE has been installed but still not able to see the exercise screens?
1) For Internet Explorer follow the below mentioned steps
  • Click "Tools" and then select "internet Options"
  • Select the Advanced Tab, and scroll down to "Java(Sun)"
  • Check the box next to the "Use Java 2" version
  • Next, Select the security Tab, and select the "Custom Level" button
  • Scroll down to "Scripting of Java applets"
  • Make sure the "Enable" radio button is checked
  • Click OK to save your preference
2) For Mozilla
  • Click "Tools" and select options
  • Select Web features & select "Enable Java" radio button
9. while downloading the PKI certificate "Certificate invalid error" is occurring?
  • The PC's which has been used to generate Root CA, Sub CA’s and in the PC were the entity certificate has been downloaded should also have uniform date & time settings.
10. While Running a Batch File the following Error occurs, What is the solution?
This error Occurs when a different version of Java Run time is used. Check whether you have installed the Correct Version of Java Run time 1.5.0
11. In RSA / RC4 / Md5 what is the strength of the Key which has been generated?
  • The Strength of RC4,RSA,SDES,3SDES is 8 – bit and for MD5 it is 128bit.
12. In Trojan horse Experiment the following error is occurrs?
  • Check whether a "chk.txt" file is been created in C:
  • Check whether the cricket folder is placed in C:
  • Check whether the IP address in the configuration.txt file matches the IP address of the machine were the Trojan Server is running.
13. Not able to download Trojan server / Trojan client /Mail Sniffer/ Mail Client applications from the Exercise page by using Internet Explorer?
  • Disable the popup blocker toolbar form the browser
  • Try to download the application by press the "Ctrl" key in the keyboard
14. Not able to see any captured data in the mail sniffer window when we try to sniff the encrypted message sent by using the mail client application?
  • Click the Binary button in the mail sniffer experiment window. The Binary Data is stored as mailsniffer_log.dat, This file can be located in the mailsinffer folder. The file content can be viewed by using a notepad.
15. Spoofing System requirements?
  • IP Spoofing Exercise is compatible to Linux platform only.
  • MAC spoofing is compatible to Windows 2000 /sp4 only.
16. Not able to perform MAC spoofing experiment & how to realize the result?
  • MAC spoofing should be performed with in the same network say i.e. both the target machine and the host should be connected to the same network.
  • Results of the spoofing experiment can be realized by using ethereal application in the target machine.
  • Check whether the firewall is been turned off.
  • Check whether WinPcap Version 3.1beta3 is been installed.
17. Not able to perform IP spoofing experiment & how to realize the result?
  • IP spoofing should be performed across the network say i.e. the target machine should connected to 10 series & the host machine is connected to the 2 series.
  • Results of the spoofing experiment can be realized by using ethereal application in the target machine
  • Check whether the firewall is been turned off
18. The connection time out error occurs in Trojan horse experiment?
  • Check whether the IP address in the configuration.txt file matches the IP address of the machine were the Trojan Server is running.