Page 1
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 1/39
//Prg 1: Identifyng thePORTS of
import java.net.*;import java.io.*;
cla local y port
! p"#lic tatic void main$String %&arg ' thro( ) ception !
Inet+ddre h,Inet+ddre .get-ocal o t$'; String ho t , h.get o t ame$';
String haddr,h.get o t+ddre $';Sy tem.o"t.println$0 n o t ame : : 02ho t';Sy tem.o"t.println$0 n o t +ddre :: 02haddr';
for$int i,3;i41356;i22' ! Soc7et ,n"ll; try ! ,ne( Soc7et$$ho t'8i'; Sy tem.o"t.println$0Port 02i20 +ctive0';
9catch$Soc7et) ception e' !
9 catch$) ception e' ! Sy tem.o"t.println$0)RROR.....0'; 9
9 99
Page 2
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 2/39
Page 3
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 3/39
//Prg 5: i' O ) TO O ) +T +PP-I +TIO
//S)R )R
import java.io.*;import java.net.*;import java.lang.*;
p"#lic cla chat e tend Thread!
p"#lic tatic void main$String arg %&'!try!ServerSoc7et , ne( ServerSoc7et $111';Sy tem.o"t.println$0 erver ready0';Soc7et , .accept$';<"fferedReader in,ne( <"fferedReader$ ne(Inp"tStreamReader$Sy tem.in'';<"fferedReader #r , ne( <"fferedReader$ ne(Inp"tStreamReader$ .getInp"tStream$''';Print=riter p(,ne( Print=riter$ne(O"tp"tStream=riter$ .getO"tp"tStream$''';(hile$tr"e'!String m g,#r.read-ine$';Sy tem.o"t.println$0from client:02m g';if$m g.e>"al $0>"it0''!Sy tem.o"t.println$0di a#led0';
#rea7;9Sy tem.o"t.println$0 erver 0';m g,in.read-ine$';
p(.println$m g'; p(.fl" h$';99
catch$IO) ception e'!Sy tem.o"t.println$0 error0';999
Page 4
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 4/39
Page 5
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 5/39
// -I) Timport java.io.*;import java.net.*;import java.lang.*;
p"#lic cla chatc!
p"#lic tatic void main$String arg %&'!try!<"fferedReader in,ne( <"fferedReader$ ne(Inp"tStreamReader$Sy tem.in'';Soc7et , ne( Soc7et$0localho t08111';<"fferedReader #r , ne( <"fferedReader$ ne(Inp"tStreamReader$ .getInp"tStream$''';Print=riter p(,ne( Print=riter$ .getO"tp"tStream$'';(hile$tr"e'!
Sy tem.o"t.println$0client0';String m g,in.read-ine$'; p(.println$m g'; p(.fl" h$';String from , #r.read-ine$';Sy tem.o"t.println$0from erver,02from';if$from.e>"al $0>"it0''!Sy tem.o"t.println$0?i connect0';Sy tem.e it$3';9
99catch$IO) ception e'!Sy tem.o"t.println$0ending0';999
Page 6
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 6/39
Page 7
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 7/39
//ii' @A-TI +T +PP-I +TIO :
//S)R )R import java.io.*;import java.net.*;
p"#lic cla m erver ! p"#lic tatic Soc7et %&,ne( Soc7et%13&; p"#lic tatic String " er%&,ne( String%13&; p"#lic tatic int total; p"#lic tatic void main$String a%&' ! int i,3; try! ServerSoc7et ,ne( ServerSoc7et$11B'; (hile$tr"e' !
%i&, .accept$';<"fferedReader #r,ne( <"fferedReader$ne(Inp"tStreamReader$ %i&.getInp"tStream$''';
String m g,#r.read-ine$'; " er%i&,m g; Sy tem.o"t.println$m g20 connected0'; try ! re>handler re>,ne( re>handler$ %i&8i'; total,i; i22; Thread t,ne( Thread$re>'; t. tart$'; 9catch$) ception e' ! Sy tem.o"t.println$e'; 9 9 9catch$) ception e' ! Sy tem.o"t.println$e'; 9 99
Page 8
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 8/39
cla re>handler implement R"nna#le! p"#lic int n; p"#lic Soc7et ; p"#lic re>handler$Soc7et oc8int i' ! , oc;
n,i; 9 p"#lic void r"n$' ! String m g,0 0; <"fferedReader #r; Print=riter p(; try! (hile$tr"e' ! #r,ne( <"fferedReader$ne(Inp"tStreamReader$ .getInp"tStream$'''; m g,#r.read-ine$'; if$m g.e>"al $0>"it0'' m erver.totalCC; el e Sy tem.o"t.println$m erver." er%n&20CD02m g'; if$m erver.total,,C1' ! Sy tem.o"t.println$0 erver ?i connected..0'; Sy tem.e it$3'; 9 for$int 7,3;74,m erver.total;722' ! if$Em erver." er%7&.e>"al $m erver." er%n&'FF$Em g.e>"al $0>"it0''' ! p(,ne( Print=riter$ne(O"tp"tStream=riter$m erver. %7&.getO"tp"tStream$'''; p(.println$m erver." er%n&20:02m g20 n0'; p(.fl" h$'; 9 9 9 9catch$) ception e' ! 9 99
Page 9
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 9/39
Page 10
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 10/39
// -I) TSimport java.io.*;import java.net.*; p"#lic cla mclient ! p"#lic tatic void main$String a%&' ! <"fferedReader in; Print=riter p(; try! Soc7et ,ne( Soc7et$0localho t0811B'; Sy tem.o"t.println$0)nter name:0'; in ,ne( <"fferedReader$ne( Inp"tStreamReader$Sy tem.in''; String m g,in.read-ine$'; p(,ne( Print=riter$ne( O"tp"tStream=riter$ .getO"tp"tStream$'''; p(.println$m g20 n0'; p(.fl" h$'; (hile$tr"e' ! readdata rd,ne( readdata$ '; Thread t,ne( Thread$rd'; t. tart$'; m g,in.read-ine$'; if$m g.e>"al $0>"it0'' ! Sy tem.e it$3';9 p(.println$m g'; p(.fl" h$'; 9 9catch$) ception e' ! Sy tem.o"t.println$e'; 9 9 9cla readdata implement R"nna#le! p"#lic Soc7et ; p"#lic readdata$Soc7et ' ! thi . , ; 9 p"#lic void r"n$' ! <"fferedReader #r;
Page 11
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 11/39
try ! (hile$tr"e' ! #r, ne( <"fferedReader$ne(Inp"tStreamReader$ .getInp"tStream$'''; String m g,#r.read-ine$';
Sy tem.o"t.println$m g'; 9 9catch$) ception e' ! Sy tem.o"t.println$e'; 9 9 9
Page 12
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 12/39
Page 13
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 13/39
Prg G: R)TRI) +- HRO@ R)@OT) ?+T+<+S)
//S)R )R import java. >l.*;import java.net.*;import java.io.*;
cla ?<Server !
p"#lic tatic void main$String arg %&' thro( ) ception!
onnection con;Re "ltSet r ;Statement ;Re "ltSet@eta?ata rm,n"ll;ServerSoc7et ;Soc7et oc;<"fferedReader #r;Print=riter p(;
la .for ame$0 "n.jd#c.od#c. d#cOd#c?river0';con ,[email protected] onnection$0jd#c:od#c:remoted#080 cott080tiger0';
, con.createStatement$';
, ne( ServerSoc7et$BJ36';(hile$tr"e'!try!
oc , .accept$';Sy tem.o"t.println$0 onnected........0';
p( , ne( Print=riter$ oc.getO"tp"tStream$''; #r , ne( <"fferedReader$ne(Inp"tStreamReader$ oc.getInp"tStream$''';String >ry , #r.read-ine$';r , .e ec"teK"ery$>ry';if$r E,n"ll' rm , r .get@eta?ata$';int cnt , rm.get ol"mn o"nt$';for$int i,1;i4,cnt;i22'
p(.print$rm.get ol"mn ame$i'20 L 0'; p(.println$0 n0'; p(.fl" h$';
int ct,3;(hile$r .ne t$''!for$int i,1;i4,cnt;i22' p(.print$r .getString$i'20 L 0';
Page 14
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 14/39
p(.println$0 n0'; p(.fl" h$';22ct;9//(hile r $'
p(.println$0 n n0 2ct20 Ro($ ' Selected0'; p(.fl" h$';
p(.println$0endM0'; p(.fl" h$';
p(.clo e$'; #r.clo e$';
oc.clo e$';Sy tem.o"t.println$0Service omplete...0';9catch$) ception e'!99//(hile9//main9//cla
// -I) Timport java. >l.*;import java.net.*;import java.io.*;
cla ?< lient!
p"#lic tatic void main$String arg %&' thro( ) ception!Soc7et oc;<"fferedReader #r87eyin;Print=riter p(;String name8data;
7eyin , ne( <"fferedReader$ne( Inp"tStreamReader$Sy tem.in'';Sy tem.o"t.print$0)nter Remote Server I?: 0';name , 7eyin.read-ine$';Sy tem.o"t.println$0)nter A R K"ery0';(hile$tr"e'!Sy tem.o"t.print$0S>lD0';String >l,7eyin.read-ine$';if$ >l.e>"al $0>"it0''
#rea7;oc , ne( Soc7et$Inet+ddre .get<y ame$name'8BJ36';
p( , ne( Print=riter$ oc.getO"tp"tStream$''; #r , ne( <"fferedReader$ne(Inp"tStreamReader$ oc.getInp"tStream$''';
p(.println$ >l'; p(.fl" h$';
Page 15
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 15/39
(hile$tr"e'!data,#r.read-ine$';if $data.e>"al $0endM0''
#rea7;Sy tem.o"t.println$data';9
9//o"ter (hile9//main9//cla
Page 16
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 16/39
Prg 6: i' POP
import java.io.*;import java.net.*;
p"#lic cla popclient!
p"#lic tatic void main$String arg %&'! try ! Soc7et , ne( Soc7et$01N5.N.533.53508113'; <"fferedReader #r,ne( <"fferedReader$ne(Inp"tStreamReader$ .getInp"tStream$''';?ataInp"tStream in,ne( ?ataInp"tStream$Sy tem.in';Print=riter p(,ne( Print=riter$ .getO"tp"tStream$'8tr"e';Sy tem.o"t.println$0enter " er name0';String " er ,in.read-ine$';
p(.println$0" er 02" er';String reply,#r.read-ine$';String rep,reply. "# tring$38G';Sy tem.o"t.println$reply';if$rep.e>"al $02O 0''! Sy tem.o"t.println$0enter pa (ord:0'; String pa ,in.read-ine$';
p(.println$0pa 02pa ';reply,#r.read-ine$';rep,reply. "# tring$38G';if$rep.e>"al $02O 0''! p(.println$0li t0';String data;(hile$E$$data,#r.read-ine$''.e>"al $0.0'''Sy tem.o"t.println$data';String readmail;Sy tem.o"t.println$0(ant to chec7 "r mail ye /no0';readmail,in.read-ine$';(hile$readmail.e>"al $0ye 0''! String no8id;Sy tem.o"t.println$0enter erial no:0'; no,in.read-ine$';Sy tem.o"t.println$0enter id:0'; id,in.read-ine$';
p(.println$0retr 02 no20 02id';(hile$E$$data,#r.read-ine$''.e>"al $0.0''' Sy tem.o"t.println$data';Sy tem.o"t.println$0(ant to chec7 "r mail ye /no0';readmail , in.read-ine$';99
Page 17
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 17/39
99catch$) ception e'! 999
Page 18
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 18/39
ii' S@TP
import java.io.*;import java.net.*;import java.lang.*;
p"#lic cla mtpclient!
p"#lic tatic void main$String arg %&'!try!
Soc7et ,ne( Soc7et$01N5.N.533.535085J';<"fferedReader #r,ne( <"fferedReader$ne(
Inp"tStreamReader$ .getInp"tStream$''';?ataInp"tStream in,ne( ?ataInp"tStream$Sy tem.in';Print=riter p(,ne(
Print=riter$ .getO"tp"tStream$'8tr"e';String data;String reply;
p(.println$0helo y temN50';reply,#r.read-ine$';Sy tem.o"t.println$reply';String rep,reply. "# tring$38G';if$rep.e>"al $05530''!
Sy tem.o"t.println$0 onnected "cce f"lly0';Sy tem.o"t.println$0enter ender name:0';String ender,in.read-ine$';
p(.println$0mail from:02 ender20Q y temN50';reply,#r.read-ine$';Sy tem.o"t.println$reply';rep,reply. "# tring$38G';if$rep.e>"al $05J30''! Sy tem.o"t.println$0)nter receiver name:0';
String rcv,in.read-ine$'; p(.println$0rcpt to:02rcv20Q y temN50';reply,#r.read-ine$';Sy tem.o"t.println$reply';rep,reply. "# tring$38G';if$rep.e>"al $05J30''!
p(.println$0data0';Sy tem.o"t.println$0)nter data to #e ent:0';
(hile$E$$data,in.read-ine$''.e>"al $0end0'''
p(.println$data';
p(.println$0.0';Sy tem.o"t.println$reply';
Page 19
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 19/39
p(.println$0>"it0';reply,#r.read-ine$';Sy tem.o"t.println$reply';Sy tem.o"t.println$0completed0';
99
9el e Sy tem.o"t.println$0connection failed0';
9
catch$) ception e'!
Sy tem.o"t.println$e';9
99
Page 20
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 20/39
//Prg J: T)- )T
// PRO R+@ HOR SI@A-+TIO OH T)- )T //
// importing pac7age
import java.io.*;
import java.net.*; import java . (ing.*; import java.a(t.event.*; import java.a(t.*;
p"#lic cla telnet e tend Hrame implement+ction-i tener8 ey-i tener ! // o#ject F varia#le declaration p"#lic tatic Te t+rea ta; @en"<ar jm; @en" conmen"; @en"Item conho t8di con8e it; #oolean edited,fal e; Soc7et oc; <"fferedReader #r; Print=riter p(; p"#lic tatic telnet t; String command; // con tr"ctor that #"ild g"i p"#lic telnet$' ! etTitle$0 Telnet 0'; etSi e$6338633'; command,ne( String$'; ta,ne( Te t+rea$'; ta.add ey-i tener$thi '; get ontentPane$'.add$ne( ScrollPane$ta''; jm,ne( @en"<ar$'; // et "p men"#ar et @en"<ar$jm'; conmen",ne( @en"$0 onnect0'; jm.add$conmen"'; // add men" to men"#ar conho t,ne( @en"Item$0 onnect0'; conho t.add+ction-i tener$thi '; di con,ne( @en"Item$0?i connect0'; di con.add+ction-i tener$thi '; e it,ne( @en"Item$0) it0'; e it.add+ction-i tener$thi '; conmen". et@nemonic$ '; conmen".add$conho t'; conmen".add$di con'; conmen".add$e it'; et i i#le$tr"e'; // di play frame ne( condialog$';
Page 21
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 21/39
9 p"#lic void 7eyPre ed$ ey)vent 7e' ! 9 p"#lic void 7eyRelea ed$ ey)vent 7e' ! 9
p"#lic void 7eyTyped$ ey)vent 7e' ! // Sy tem.o"t.println$7e.get ey har$''; if$7e.get ey har$',, ey)vent. ) T)R' ! Sy tem.o"t.println$command'; p(.println$command'; command,00; 9 el e if$7e.get ey har$'E, ey)vent. S IHT' command,command27e.get ey har$'; 9
p"#lic void actionPerformed$+ction)vent ae' ! O#ject o#,ae.getSo"rce$'; if$o#,,e it' Sy tem.e it$3'; el e if$o#,,conho t' ne( condialog$'; if$o#,,di con' if$E$ oc,,n"ll'' ! Sy tem.o"t.println$0 onnection clo ed0'; try ! oc.clo e$';
oc,n"ll; 9catch$) ception e' ! Sy tem.o"t.println$e'; 9 9 9 void ma7econnection$' ! try !
Page 22
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 22/39
oc,ne(Soc7et$condialog.ho t.getTe t$'.trim$'8Integer.par eInt$condialog.port.getTe t$'.trim$'''; OptionPane. ho(@e age?ialog$n"ll80 onnectione ta#li hed0'; Sy tem.o"t.println$0 onnection e ta#li hed 0'; #r,ne( <"fferedReader$ne(
Inp"tStreamReader$ oc.getInp"tStream$'''; p(,ne( Print=riter$ oc.getO"tp"tStream$'8tr"e'; /* String reply,#r.read-ine$'; ta.append$reply20 n0'; ta. et aretPo ition$reply.length$''; */ ne( readthread$'. tart$'; 9
catch$) ception e' ! Sy tem.o"t.println$e';
OptionPane. ho(@e age?ialog$n"ll80 onnection to ho tlo t0'; 9 9 // cla that read re pon e from erver
cla readthread e tend Thread !
p"#lic void r"n$' ! try ! int off,3; (hile$tr"e' !
String reply,#r.read-ine$'; //read re pon e if$reply,,n"ll' Sy tem.e it$1'; ta.append$reply20 n0'; // append re pon e to te tarea
int lc,ta.get-ine o"nt$'; off,ta.get-ineStartOff et$lc'; ta. et aretPo ition$off'; // place c"r or at the end 9
9 catch$) ception e' ! Sy tem.o"t.println$e'; OptionPane. ho(@e age?ialog$n"ll80 onnection To o t-o t0'; 9 9 9
Page 23
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 23/39
p"#lic tatic void main$String a%&' ! t,ne( telnet$'; // t.ma7econnection$'; 99 // cla that create connection dialog
cla condialog implement +ction-i tener ! ?ialog jd; p"#lic tatic Te tHield ho t8port; <"tton connect8cancel; p"#lic condialog$' ! jd,ne( ?ialog$'; ho t,ne( Te tHield$63'; port,ne( Te tHield$63'; connect,ne( <"tton$0 O ) T0'; cancel,ne( <"tton$0 + )-0'; connect.add+ction-i tener$thi '; cancel.add+ction-i tener$thi '; jd. et<o"nd $5338G338G3381J3'; jd.get ontentPane$'. et-ayo"t$ne( rid-ayo"t$G85''; jd.get ontentPane$'.add$ne( -a#el$0Remote o t :0''; jd.get ontentPane$'.add$ho t'; jd.get ontentPane$'.add$ne( -a#el$0Port "m#er :0''; jd.get ontentPane$'.add$port'; jd.get ontentPane$'.add$connect'; jd.get ontentPane$'.add$cancel'; jd. et i i#le$tr"e'; 9 p"#lic void actionPerformed$+ction)vent ae' ! O#ject o#,ae.getSo"rce$'; if$o#,,cancel' jd.di po e$'; el e if$o#,,connect' ! jd.di po e$'; telnet.t.ma7econnection$'; 9 9 9
Page 24
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 24/39
Page 25
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 25/39
Prg U: HTP
//S)R )R import java.io.*;import java.net.*;
p"#lic cla ftp erver !
p"#lic tatic void main$String arg %&' thro( ) ception! ServerSoc7et , ne( ServerSoc7et$N333'; Sy tem.o"t.println$0Server Strated0'; try ! (hile$tr"e' ! Soc7et , .accept$'; ?ataInp"tStream di,ne( ?ataInp"tStream$ .getInp"tStream$'';
PrintStream p,ne( PrintStream$ .getO"tp"tStream$'';String t,di.read-ine$';String temp, t;temp, 0file://02 t;AR- ",ne( AR-$temp';AR- onnection "c , ".open onnection$';//int length ,"c.get ontent-ength$';//Sy tem.o"t.println$length';//p.println$length';
HileInp"tStream dil,ne( HileInp"tStream$ t';int ch;(hile$$ch,dil.read$''E,C1'!Sy tem.o"t.print$$char'ch';
p.(rite$ch';9 .clo e$'; 9 9 catch$) ception e' !999
Page 26
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 26/39
Page 27
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 27/39
// -I) T
import java.io.*;import java.net.*;
p"#lic cla ftpclient! p"#lic tatic void main$String arg %&' thro( ) ception ! Soc7et ,ne( Soc7et$0localho t08N333';
<"fferedReader d1,ne( <"fferedReader$ne(Inp"tStreamReader$ .getInp"tStream$'''; Inp"tStream in, .getInp"tStream$'; ?ataInp"tStream di, ne( ?ataInp"tStream$Sy tem.in'; PrintStream p,ne( PrintStream$ .getO"tp"tStream$'';
Sy tem.o"t.println$0)nter a# ol"te.path0'; String t,di.read-ine$';
p.println$ t';
Sy tem.o"t.println$0enter de tination0';
String file,di.read-ine$';
HileO"tp"tStream fo ,ne( HileO"tp"tStream$file';
int ch;(hile$$ch,d1.read$''E,C1'!Sy tem.o"t.print$$char'ch';fo .(rite$ch';9
99
Page 28
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 28/39
Page 29
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 29/39
! ?atagramSoc7et d ;Sy tem.o"t.println$0 erver ready0';d ,ne( ?atagramSoc7et$UN';tftpm m ,ne( tftpm $d ';99
Page 30
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 30/39
// -I) T
import java.io.*;import java.net.*;cla tftpclient!
p"#lic tatic void main$String arg %&' !tftpc c,ne( tftpc$'; 99cla tftpc!?atagramSoc7et d ;int #"ff i e,5333;
#yte #"ff%&,ne( #yte%#"ff i e&;tftpc$'!try! d ,ne( ?atagramSoc7et$J3';9catch $) ception e'!Sy tem.e it$3';9?ataInp"tStream in,ne( ?ataInp"tStream$Sy tem.in'; try!Sy tem.o"t.println$0)nter a# ol"te path of file:0';String tr,in.read-ine$';int po , tr.length$';
#yte #"f%&,ne( #yte%po &;for$int i,3;i4po ;i22'
#"f%i&,$#yte' tr.char+t$i';d . end$ne( ?atagramPac7et$#"f8po 8Inet+ddre .get-ocal o t$'8UN'';Sy tem.o"t.println$0enter the name to #e aved0';String tt,in.read-ine$';HileO"tp"tStream fo ,ne( HileO"tp"tStream$ tt';(hile$tr"e'!?atagramPac7et dp,ne( ?atagramPac7et$#"ff8#"ff.length';d .receive$dp';String file,ne( String$dp.get?ata$'838dp.get-ength$'';int g,file.length$';for$int j,3;j4g;j22'fo .(rite$$char'file.char+t$j'';99catch$) ception e'!9 9 9
Page 31
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 31/39
Page 32
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 32/39
/ / 7 : H T T P
/* SERVER SIDE PROGRAM */
/*Program name : http.javaPac7age " ed : java.io.*8java.net.*8
O#ject " ed : 18 conaria#le " ed : line% &8 file@ethod " ed : main$'
la e " ed : http 8 htpc-oop " ed : doC(hile*/
import java.io.*;import java.net.*;import java.lang.*;
p"#lic cla htp! p"#lic tatic void main$String arg %&' thro( ) ception
! ServerSoc7et 1,ne( ServerSoc7et$5333';
Soc7et con1, 1.accept$'; // accepting connection Sy tem.o"t.println$0 onnected to Server0';
<"fferedReader command Hrom lient,ne( <"fferedReader$ne(Inp"tStreamReader$con1.getInp"tStream$''';
Print=riter re pon eTo lient,ne(Print=riter$con1.getO"tp"tStream$'8tr"e';
<"fferedReader inp"t,ne( <"fferedReader$ne(Inp"tStreamReader$Sy tem.in''; int choice;
do !
choice,Integer.par eInt$command Hrom lient.read-ine$''; String file; #yte line%&,n"ll; Hile f; (itch$choice'
! ca e
1:Sy tem.o"t.println$01. )+?0'; file,command Hrom lient.read-ine$';
f,ne( Hile$file'; int inde ,file.la tInde Of$0.0';
String type,file. "# tring$inde 21'; re pon eTo lient.println$type';
long length,f.length$'; re pon eTo lient.println$length';
#rea7;
ca e 5:Sy tem.o"t.println$05.POST0'; file,command Hrom lient.read-ine$';
Sy tem.o"t.println$0@)SS+ ) POST)? HRO@-I) T:0';
Page 33
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 33/39
Sy tem.o"t.println$file'; #rea7;
ca e G:Sy tem.o"t.println$0G. )T0';
file,command Hrom lient.read-ine$';HileInp"tStream fi ,ne( HileInp"tStream$file';
(hile$fi .availa#le$'E,3' !
if$fi .availa#le$'41356' line,ne( #yte%fi .availa#le$'&; el e line,ne( #yte%1356&; fi .read$line'; file,ne( String$line'; re pon eTo lient.println$file'; 9
re pon eTo lient.println$0***0'; fi .clo e$';
#rea7; ca e 6:Sy tem.o"t.println$06.?)-)T)0';
file,command Hrom lient.read-ine$'; f,ne( Hile$file';
f.delete$'; #rea7;
defa"lt:Sy tem.o"t.print$0J.)XIT0'; Sy tem.e it$3';
99
(hile$choice4,6'; con1.clo e$'; 1.clo e$'; 9
9
Page 34
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 34/39
/* CLIENT SIDE PROGRAM */
import java.io.*;import java.net.*;import java.lang.*;import java."til.*;
p"#lic cla htpc ! p"#lic tatic void main$String arg %&' thro( ) ception ! Soc7et con1,ne( Soc7et$0localho t085333'; <"fferedReader re pon eHromServer,ne( <"fferedReader$ne(Inp"tStreamReader$con1.getInp"tStream$'''; Print=riter command ToServer,ne( Print=riter$con1.getO"tp"tStream$'8tr"e'; <"fferedReader inp"t,ne( <"fferedReader$ne(Inp"tStreamReader$Sy tem.in'';
Sy tem.o"t.println$0 O ) T)? TO S)R )R0'; int choice; do ! Sy tem.o"t.println$0 O@@+ ?S0'; Sy tem.o"t.println$01. )+? 5.POST G. )T 6.?)-)T) J.)XIT0'; Sy tem.o"t.println$0) T)R YOAR OI ):0'; choice,Integer.par eInt$inp"t.read-ine$''; #yte line%&,n"ll; String file; (itch$choice'
!
ca e 1:command ToServer.println$010'; Sy tem.o"t.println$0) T)R HI-) +@) TO )T T ) )+?)R:0'; file,inp"t.read-ine$'; command ToServer.println$file'; String type,re pon eHromServer.read-ine$'; String length,re pon eHromServer.read-ine$';
Sy tem.o"t.println$0HI-):02file20TYP):02type20-) T :02length'; #rea7; ca e 5:command ToServer.println$050'; Sy tem.o"t.println$0) T)R T)XT TO POST:0'; file,inp"t.read-ine$'; command ToServer.println$file'; #rea7; ca e G:command ToServer.println$0G0'; Sy tem.o"t.println$0) T)R HI-) +@) TO )T:0'; file,inp"t.read-ine$'; command ToServer.println$file'; Sy tem.o"t.println$0) T)R HI-) +@) TO S+ ):0'; file,inp"t.read-ine$'; HileO"tp"tStream fo ,ne( HileO"tp"tStream$file'; (hile$tr"e' !
Page 35
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 35/39
String ,re pon eHromServer.read-ine$'; if$ .e>"al $0***0'' #rea7; int co"nt, .length$'; if$co"nt41356' line,ne( #yte%co"nt&; el e line,ne( #yte%1356&; line, .get<yte $'; fo .(rite$line'; 9
fo .clo e$'; #rea7; ca e 6:command ToServer.println$060'; Sy tem.o"t.println$0) T)R HI-) +@) TO ?)-)T):0'; file,inp"t.read-ine$'; command ToServer.println$file'; #rea7;
defa"lt:command ToServer.println$0J0'; Sy tem.e it$3'; 9 9 (hile$choice4,6'; con1.clo e$'; 9 9
Page 36
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 36/39
Page 37
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 37/39
Page 38
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 38/39
! String ,re pon eHromServer.read-ine$'; if$ .e>"al $0***0'' #rea7; int co"nt, .length$'; if$co"nt41356' line,ne( #yte%co"nt&; el e line,ne( #yte%1356&; line, .get<yte $'; fo .(rite$line'; 9
fo .clo e$'; #rea7; ca e 6:command ToServer.println$060'; Sy tem.o"t.println$0) T)R HI-) +@) TO ?)-)T):0'; file,inp"t.read-ine$'; command ToServer.println$file';
#rea7; defa"lt:command ToServer.println$0J0'; Sy tem.e it$3'; 9 9 (hile$choice4,6'; con1.clo e$'; 9 9
Page 39
8/10/2019 network security lab programs by gitam
http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 39/39