Top Banner
//Prg 1: Identifyng thePOR TS of import java.net.*; import java.io.*; cla localyport !  p"#lic tatic void main$String %&arg' thro( )ception  ! Inet+ddre h,Inet+ddre.get-ocalot$';  String hot , h.getotame$'; String haddr,h.getot+ddre$'; Sytem.o"t.println$0n ot ame : : 02hot'; Sytem.o"t.println$0n ot +ddre :: 02haddr';  for$int i,3;i41356;i22'  !  Soc7et ,n"ll;  try  !  ,ne( Soc7et$$hot'8i';  Sytem.o"t.println$0Port 02i20 +ctive0';  9catch$Soc7et)ception e'  !  9  catch$)ception e'  !  Sytem.o"t.println$0)RROR.....0';  9  9  9 9
39

network security lab programs by gitam

Jun 02, 2018

Download

Documents

PothannaSetti
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 1/39

//Prg 1: Identifyng thePORTS of

import java.net.*;import java.io.*;

cla local y port

! p"#lic tatic void main$String %&arg ' thro( ) ception !

Inet+ddre h,Inet+ddre .get-ocal o t$'; String ho t , h.get o t ame$';

String haddr,h.get o t+ddre $';Sy tem.o"t.println$0 n o t ame : : 02ho t';Sy tem.o"t.println$0 n o t +ddre :: 02haddr';

for$int i,3;i41356;i22' ! Soc7et ,n"ll; try ! ,ne( Soc7et$$ho t'8i'; Sy tem.o"t.println$0Port 02i20 +ctive0';

9catch$Soc7et) ception e' !

9 catch$) ception e' ! Sy tem.o"t.println$0)RROR.....0'; 9

9 99

Page 2: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 2/39

Page 3: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 3/39

//Prg 5: i' O ) TO O ) +T +PP-I +TIO

//S)R )R

import java.io.*;import java.net.*;import java.lang.*;

p"#lic cla chat e tend Thread!

p"#lic tatic void main$String arg %&'!try!ServerSoc7et , ne( ServerSoc7et $111';Sy tem.o"t.println$0 erver ready0';Soc7et , .accept$';<"fferedReader in,ne( <"fferedReader$ ne(Inp"tStreamReader$Sy tem.in'';<"fferedReader #r , ne( <"fferedReader$ ne(Inp"tStreamReader$ .getInp"tStream$''';Print=riter p(,ne( Print=riter$ne(O"tp"tStream=riter$ .getO"tp"tStream$''';(hile$tr"e'!String m g,#r.read-ine$';Sy tem.o"t.println$0from client:02m g';if$m g.e>"al $0>"it0''!Sy tem.o"t.println$0di a#led0';

#rea7;9Sy tem.o"t.println$0 erver 0';m g,in.read-ine$';

p(.println$m g'; p(.fl" h$';99

catch$IO) ception e'!Sy tem.o"t.println$0 error0';999

Page 4: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 4/39

Page 5: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 5/39

// -I) Timport java.io.*;import java.net.*;import java.lang.*;

p"#lic cla chatc!

p"#lic tatic void main$String arg %&'!try!<"fferedReader in,ne( <"fferedReader$ ne(Inp"tStreamReader$Sy tem.in'';Soc7et , ne( Soc7et$0localho t08111';<"fferedReader #r , ne( <"fferedReader$ ne(Inp"tStreamReader$ .getInp"tStream$''';Print=riter p(,ne( Print=riter$ .getO"tp"tStream$'';(hile$tr"e'!

Sy tem.o"t.println$0client0';String m g,in.read-ine$'; p(.println$m g'; p(.fl" h$';String from , #r.read-ine$';Sy tem.o"t.println$0from erver,02from';if$from.e>"al $0>"it0''!Sy tem.o"t.println$0?i connect0';Sy tem.e it$3';9

99catch$IO) ception e'!Sy tem.o"t.println$0ending0';999

Page 6: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 6/39

Page 7: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 7/39

//ii' @A-TI +T +PP-I +TIO :

//S)R )R import java.io.*;import java.net.*;

p"#lic cla m erver ! p"#lic tatic Soc7et %&,ne( Soc7et%13&; p"#lic tatic String " er%&,ne( String%13&; p"#lic tatic int total; p"#lic tatic void main$String a%&' ! int i,3; try! ServerSoc7et ,ne( ServerSoc7et$11B'; (hile$tr"e' !

%i&, .accept$';<"fferedReader #r,ne( <"fferedReader$ne(Inp"tStreamReader$ %i&.getInp"tStream$''';

String m g,#r.read-ine$'; " er%i&,m g; Sy tem.o"t.println$m g20 connected0'; try ! re>handler re>,ne( re>handler$ %i&8i'; total,i; i22; Thread t,ne( Thread$re>'; t. tart$'; 9catch$) ception e' ! Sy tem.o"t.println$e'; 9 9 9catch$) ception e' ! Sy tem.o"t.println$e'; 9 99

Page 8: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 8/39

cla re>handler implement R"nna#le! p"#lic int n; p"#lic Soc7et ; p"#lic re>handler$Soc7et oc8int i' ! , oc;

n,i; 9 p"#lic void r"n$' ! String m g,0 0; <"fferedReader #r; Print=riter p(; try! (hile$tr"e' ! #r,ne( <"fferedReader$ne(Inp"tStreamReader$ .getInp"tStream$'''; m g,#r.read-ine$'; if$m g.e>"al $0>"it0'' m erver.totalCC; el e Sy tem.o"t.println$m erver." er%n&20CD02m g'; if$m erver.total,,C1' ! Sy tem.o"t.println$0 erver ?i connected..0'; Sy tem.e it$3'; 9 for$int 7,3;74,m erver.total;722' ! if$Em erver." er%7&.e>"al $m erver." er%n&'FF$Em g.e>"al $0>"it0''' ! p(,ne( Print=riter$ne(O"tp"tStream=riter$m erver. %7&.getO"tp"tStream$'''; p(.println$m erver." er%n&20:02m g20 n0'; p(.fl" h$'; 9 9 9 9catch$) ception e' ! 9 99

Page 9: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 9/39

Page 10: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 10/39

// -I) TSimport java.io.*;import java.net.*; p"#lic cla mclient ! p"#lic tatic void main$String a%&' ! <"fferedReader in; Print=riter p(; try! Soc7et ,ne( Soc7et$0localho t0811B'; Sy tem.o"t.println$0)nter name:0'; in ,ne( <"fferedReader$ne( Inp"tStreamReader$Sy tem.in''; String m g,in.read-ine$'; p(,ne( Print=riter$ne( O"tp"tStream=riter$ .getO"tp"tStream$'''; p(.println$m g20 n0'; p(.fl" h$'; (hile$tr"e' ! readdata rd,ne( readdata$ '; Thread t,ne( Thread$rd'; t. tart$'; m g,in.read-ine$'; if$m g.e>"al $0>"it0'' ! Sy tem.e it$3';9 p(.println$m g'; p(.fl" h$'; 9 9catch$) ception e' ! Sy tem.o"t.println$e'; 9 9 9cla readdata implement R"nna#le! p"#lic Soc7et ; p"#lic readdata$Soc7et ' ! thi . , ; 9 p"#lic void r"n$' ! <"fferedReader #r;

Page 11: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 11/39

try ! (hile$tr"e' ! #r, ne( <"fferedReader$ne(Inp"tStreamReader$ .getInp"tStream$'''; String m g,#r.read-ine$';

Sy tem.o"t.println$m g'; 9 9catch$) ception e' ! Sy tem.o"t.println$e'; 9 9 9

Page 12: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 12/39

Page 13: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 13/39

Prg G: R)TRI) +- HRO@ R)@OT) ?+T+<+S)

//S)R )R import java. >l.*;import java.net.*;import java.io.*;

cla ?<Server !

p"#lic tatic void main$String arg %&' thro( ) ception!

onnection con;Re "ltSet r ;Statement ;Re "ltSet@eta?ata rm,n"ll;ServerSoc7et ;Soc7et oc;<"fferedReader #r;Print=riter p(;

la .for ame$0 "n.jd#c.od#c. d#cOd#c?river0';con ,[email protected] onnection$0jd#c:od#c:remoted#080 cott080tiger0';

, con.createStatement$';

, ne( ServerSoc7et$BJ36';(hile$tr"e'!try!

oc , .accept$';Sy tem.o"t.println$0 onnected........0';

p( , ne( Print=riter$ oc.getO"tp"tStream$''; #r , ne( <"fferedReader$ne(Inp"tStreamReader$ oc.getInp"tStream$''';String >ry , #r.read-ine$';r , .e ec"teK"ery$>ry';if$r E,n"ll' rm , r .get@eta?ata$';int cnt , rm.get ol"mn o"nt$';for$int i,1;i4,cnt;i22'

p(.print$rm.get ol"mn ame$i'20 L 0'; p(.println$0 n0'; p(.fl" h$';

int ct,3;(hile$r .ne t$''!for$int i,1;i4,cnt;i22' p(.print$r .getString$i'20 L 0';

Page 14: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 14/39

p(.println$0 n0'; p(.fl" h$';22ct;9//(hile r $'

p(.println$0 n n0 2ct20 Ro($ ' Selected0'; p(.fl" h$';

p(.println$0endM0'; p(.fl" h$';

p(.clo e$'; #r.clo e$';

oc.clo e$';Sy tem.o"t.println$0Service omplete...0';9catch$) ception e'!99//(hile9//main9//cla

// -I) Timport java. >l.*;import java.net.*;import java.io.*;

cla ?< lient!

p"#lic tatic void main$String arg %&' thro( ) ception!Soc7et oc;<"fferedReader #r87eyin;Print=riter p(;String name8data;

7eyin , ne( <"fferedReader$ne( Inp"tStreamReader$Sy tem.in'';Sy tem.o"t.print$0)nter Remote Server I?: 0';name , 7eyin.read-ine$';Sy tem.o"t.println$0)nter A R K"ery0';(hile$tr"e'!Sy tem.o"t.print$0S>lD0';String >l,7eyin.read-ine$';if$ >l.e>"al $0>"it0''

#rea7;oc , ne( Soc7et$Inet+ddre .get<y ame$name'8BJ36';

p( , ne( Print=riter$ oc.getO"tp"tStream$''; #r , ne( <"fferedReader$ne(Inp"tStreamReader$ oc.getInp"tStream$''';

p(.println$ >l'; p(.fl" h$';

Page 15: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 15/39

(hile$tr"e'!data,#r.read-ine$';if $data.e>"al $0endM0''

#rea7;Sy tem.o"t.println$data';9

9//o"ter (hile9//main9//cla

Page 16: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 16/39

Prg 6: i' POP

import java.io.*;import java.net.*;

p"#lic cla popclient!

p"#lic tatic void main$String arg %&'! try ! Soc7et , ne( Soc7et$01N5.N.533.53508113'; <"fferedReader #r,ne( <"fferedReader$ne(Inp"tStreamReader$ .getInp"tStream$''';?ataInp"tStream in,ne( ?ataInp"tStream$Sy tem.in';Print=riter p(,ne( Print=riter$ .getO"tp"tStream$'8tr"e';Sy tem.o"t.println$0enter " er name0';String " er ,in.read-ine$';

p(.println$0" er 02" er';String reply,#r.read-ine$';String rep,reply. "# tring$38G';Sy tem.o"t.println$reply';if$rep.e>"al $02O 0''! Sy tem.o"t.println$0enter pa (ord:0'; String pa ,in.read-ine$';

p(.println$0pa 02pa ';reply,#r.read-ine$';rep,reply. "# tring$38G';if$rep.e>"al $02O 0''! p(.println$0li t0';String data;(hile$E$$data,#r.read-ine$''.e>"al $0.0'''Sy tem.o"t.println$data';String readmail;Sy tem.o"t.println$0(ant to chec7 "r mail ye /no0';readmail,in.read-ine$';(hile$readmail.e>"al $0ye 0''! String no8id;Sy tem.o"t.println$0enter erial no:0'; no,in.read-ine$';Sy tem.o"t.println$0enter id:0'; id,in.read-ine$';

p(.println$0retr 02 no20 02id';(hile$E$$data,#r.read-ine$''.e>"al $0.0''' Sy tem.o"t.println$data';Sy tem.o"t.println$0(ant to chec7 "r mail ye /no0';readmail , in.read-ine$';99

Page 17: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 17/39

99catch$) ception e'! 999

Page 18: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 18/39

ii' S@TP

import java.io.*;import java.net.*;import java.lang.*;

p"#lic cla mtpclient!

p"#lic tatic void main$String arg %&'!try!

Soc7et ,ne( Soc7et$01N5.N.533.535085J';<"fferedReader #r,ne( <"fferedReader$ne(

Inp"tStreamReader$ .getInp"tStream$''';?ataInp"tStream in,ne( ?ataInp"tStream$Sy tem.in';Print=riter p(,ne(

Print=riter$ .getO"tp"tStream$'8tr"e';String data;String reply;

p(.println$0helo y temN50';reply,#r.read-ine$';Sy tem.o"t.println$reply';String rep,reply. "# tring$38G';if$rep.e>"al $05530''!

Sy tem.o"t.println$0 onnected "cce f"lly0';Sy tem.o"t.println$0enter ender name:0';String ender,in.read-ine$';

p(.println$0mail from:02 ender20Q y temN50';reply,#r.read-ine$';Sy tem.o"t.println$reply';rep,reply. "# tring$38G';if$rep.e>"al $05J30''! Sy tem.o"t.println$0)nter receiver name:0';

String rcv,in.read-ine$'; p(.println$0rcpt to:02rcv20Q y temN50';reply,#r.read-ine$';Sy tem.o"t.println$reply';rep,reply. "# tring$38G';if$rep.e>"al $05J30''!

p(.println$0data0';Sy tem.o"t.println$0)nter data to #e ent:0';

(hile$E$$data,in.read-ine$''.e>"al $0end0'''

p(.println$data';

p(.println$0.0';Sy tem.o"t.println$reply';

Page 19: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 19/39

p(.println$0>"it0';reply,#r.read-ine$';Sy tem.o"t.println$reply';Sy tem.o"t.println$0completed0';

99

9el e Sy tem.o"t.println$0connection failed0';

9

catch$) ception e'!

Sy tem.o"t.println$e';9

99

Page 20: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 20/39

//Prg J: T)- )T

// PRO R+@ HOR SI@A-+TIO OH T)- )T //

// importing pac7age

import java.io.*;

import java.net.*; import java . (ing.*; import java.a(t.event.*; import java.a(t.*;

p"#lic cla telnet e tend Hrame implement+ction-i tener8 ey-i tener ! // o#ject F varia#le declaration p"#lic tatic Te t+rea ta; @en"<ar jm; @en" conmen"; @en"Item conho t8di con8e it; #oolean edited,fal e; Soc7et oc; <"fferedReader #r; Print=riter p(; p"#lic tatic telnet t; String command; // con tr"ctor that #"ild g"i p"#lic telnet$' ! etTitle$0 Telnet 0'; etSi e$6338633'; command,ne( String$'; ta,ne( Te t+rea$'; ta.add ey-i tener$thi '; get ontentPane$'.add$ne( ScrollPane$ta''; jm,ne( @en"<ar$'; // et "p men"#ar et @en"<ar$jm'; conmen",ne( @en"$0 onnect0'; jm.add$conmen"'; // add men" to men"#ar conho t,ne( @en"Item$0 onnect0'; conho t.add+ction-i tener$thi '; di con,ne( @en"Item$0?i connect0'; di con.add+ction-i tener$thi '; e it,ne( @en"Item$0) it0'; e it.add+ction-i tener$thi '; conmen". et@nemonic$ '; conmen".add$conho t'; conmen".add$di con'; conmen".add$e it'; et i i#le$tr"e'; // di play frame ne( condialog$';

Page 21: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 21/39

9 p"#lic void 7eyPre ed$ ey)vent 7e' ! 9 p"#lic void 7eyRelea ed$ ey)vent 7e' ! 9

p"#lic void 7eyTyped$ ey)vent 7e' ! // Sy tem.o"t.println$7e.get ey har$''; if$7e.get ey har$',, ey)vent. ) T)R' ! Sy tem.o"t.println$command'; p(.println$command'; command,00; 9 el e if$7e.get ey har$'E, ey)vent. S IHT' command,command27e.get ey har$'; 9

p"#lic void actionPerformed$+ction)vent ae' ! O#ject o#,ae.getSo"rce$'; if$o#,,e it' Sy tem.e it$3'; el e if$o#,,conho t' ne( condialog$'; if$o#,,di con' if$E$ oc,,n"ll'' ! Sy tem.o"t.println$0 onnection clo ed0'; try ! oc.clo e$';

oc,n"ll; 9catch$) ception e' ! Sy tem.o"t.println$e'; 9 9 9 void ma7econnection$' ! try !

Page 22: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 22/39

oc,ne(Soc7et$condialog.ho t.getTe t$'.trim$'8Integer.par eInt$condialog.port.getTe t$'.trim$'''; OptionPane. ho(@e age?ialog$n"ll80 onnectione ta#li hed0'; Sy tem.o"t.println$0 onnection e ta#li hed 0'; #r,ne( <"fferedReader$ne(

Inp"tStreamReader$ oc.getInp"tStream$'''; p(,ne( Print=riter$ oc.getO"tp"tStream$'8tr"e'; /* String reply,#r.read-ine$'; ta.append$reply20 n0'; ta. et aretPo ition$reply.length$''; */ ne( readthread$'. tart$'; 9

catch$) ception e' ! Sy tem.o"t.println$e';

OptionPane. ho(@e age?ialog$n"ll80 onnection to ho tlo t0'; 9 9 // cla that read re pon e from erver

cla readthread e tend Thread !

p"#lic void r"n$' ! try ! int off,3; (hile$tr"e' !

String reply,#r.read-ine$'; //read re pon e if$reply,,n"ll' Sy tem.e it$1'; ta.append$reply20 n0'; // append re pon e to te tarea

int lc,ta.get-ine o"nt$'; off,ta.get-ineStartOff et$lc'; ta. et aretPo ition$off'; // place c"r or at the end 9

9 catch$) ception e' ! Sy tem.o"t.println$e'; OptionPane. ho(@e age?ialog$n"ll80 onnection To o t-o t0'; 9 9 9

Page 23: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 23/39

p"#lic tatic void main$String a%&' ! t,ne( telnet$'; // t.ma7econnection$'; 99 // cla that create connection dialog

cla condialog implement +ction-i tener ! ?ialog jd; p"#lic tatic Te tHield ho t8port; <"tton connect8cancel; p"#lic condialog$' ! jd,ne( ?ialog$'; ho t,ne( Te tHield$63'; port,ne( Te tHield$63'; connect,ne( <"tton$0 O ) T0'; cancel,ne( <"tton$0 + )-0'; connect.add+ction-i tener$thi '; cancel.add+ction-i tener$thi '; jd. et<o"nd $5338G338G3381J3'; jd.get ontentPane$'. et-ayo"t$ne( rid-ayo"t$G85''; jd.get ontentPane$'.add$ne( -a#el$0Remote o t :0''; jd.get ontentPane$'.add$ho t'; jd.get ontentPane$'.add$ne( -a#el$0Port "m#er :0''; jd.get ontentPane$'.add$port'; jd.get ontentPane$'.add$connect'; jd.get ontentPane$'.add$cancel'; jd. et i i#le$tr"e'; 9 p"#lic void actionPerformed$+ction)vent ae' ! O#ject o#,ae.getSo"rce$'; if$o#,,cancel' jd.di po e$'; el e if$o#,,connect' ! jd.di po e$'; telnet.t.ma7econnection$'; 9 9 9

Page 24: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 24/39

Page 25: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 25/39

Prg U: HTP

//S)R )R import java.io.*;import java.net.*;

p"#lic cla ftp erver !

p"#lic tatic void main$String arg %&' thro( ) ception! ServerSoc7et , ne( ServerSoc7et$N333'; Sy tem.o"t.println$0Server Strated0'; try ! (hile$tr"e' ! Soc7et , .accept$'; ?ataInp"tStream di,ne( ?ataInp"tStream$ .getInp"tStream$'';

PrintStream p,ne( PrintStream$ .getO"tp"tStream$'';String t,di.read-ine$';String temp, t;temp, 0file://02 t;AR- ",ne( AR-$temp';AR- onnection "c , ".open onnection$';//int length ,"c.get ontent-ength$';//Sy tem.o"t.println$length';//p.println$length';

HileInp"tStream dil,ne( HileInp"tStream$ t';int ch;(hile$$ch,dil.read$''E,C1'!Sy tem.o"t.print$$char'ch';

p.(rite$ch';9 .clo e$'; 9 9 catch$) ception e' !999

Page 26: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 26/39

Page 27: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 27/39

// -I) T

import java.io.*;import java.net.*;

p"#lic cla ftpclient! p"#lic tatic void main$String arg %&' thro( ) ception ! Soc7et ,ne( Soc7et$0localho t08N333';

<"fferedReader d1,ne( <"fferedReader$ne(Inp"tStreamReader$ .getInp"tStream$'''; Inp"tStream in, .getInp"tStream$'; ?ataInp"tStream di, ne( ?ataInp"tStream$Sy tem.in'; PrintStream p,ne( PrintStream$ .getO"tp"tStream$'';

Sy tem.o"t.println$0)nter a# ol"te.path0'; String t,di.read-ine$';

p.println$ t';

Sy tem.o"t.println$0enter de tination0';

String file,di.read-ine$';

HileO"tp"tStream fo ,ne( HileO"tp"tStream$file';

int ch;(hile$$ch,d1.read$''E,C1'!Sy tem.o"t.print$$char'ch';fo .(rite$ch';9

99

Page 28: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 28/39

Page 29: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 29/39

! ?atagramSoc7et d ;Sy tem.o"t.println$0 erver ready0';d ,ne( ?atagramSoc7et$UN';tftpm m ,ne( tftpm $d ';99

Page 30: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 30/39

// -I) T

import java.io.*;import java.net.*;cla tftpclient!

p"#lic tatic void main$String arg %&' !tftpc c,ne( tftpc$'; 99cla tftpc!?atagramSoc7et d ;int #"ff i e,5333;

#yte #"ff%&,ne( #yte%#"ff i e&;tftpc$'!try! d ,ne( ?atagramSoc7et$J3';9catch $) ception e'!Sy tem.e it$3';9?ataInp"tStream in,ne( ?ataInp"tStream$Sy tem.in'; try!Sy tem.o"t.println$0)nter a# ol"te path of file:0';String tr,in.read-ine$';int po , tr.length$';

#yte #"f%&,ne( #yte%po &;for$int i,3;i4po ;i22'

#"f%i&,$#yte' tr.char+t$i';d . end$ne( ?atagramPac7et$#"f8po 8Inet+ddre .get-ocal o t$'8UN'';Sy tem.o"t.println$0enter the name to #e aved0';String tt,in.read-ine$';HileO"tp"tStream fo ,ne( HileO"tp"tStream$ tt';(hile$tr"e'!?atagramPac7et dp,ne( ?atagramPac7et$#"ff8#"ff.length';d .receive$dp';String file,ne( String$dp.get?ata$'838dp.get-ength$'';int g,file.length$';for$int j,3;j4g;j22'fo .(rite$$char'file.char+t$j'';99catch$) ception e'!9 9 9

Page 31: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 31/39

Page 32: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 32/39

/ / 7 : H T T P

/* SERVER SIDE PROGRAM */

/*Program name : http.javaPac7age " ed : java.io.*8java.net.*8

O#ject " ed : 18 conaria#le " ed : line% &8 file@ethod " ed : main$'

la e " ed : http 8 htpc-oop " ed : doC(hile*/

import java.io.*;import java.net.*;import java.lang.*;

p"#lic cla htp! p"#lic tatic void main$String arg %&' thro( ) ception

! ServerSoc7et 1,ne( ServerSoc7et$5333';

Soc7et con1, 1.accept$'; // accepting connection Sy tem.o"t.println$0 onnected to Server0';

<"fferedReader command Hrom lient,ne( <"fferedReader$ne(Inp"tStreamReader$con1.getInp"tStream$''';

Print=riter re pon eTo lient,ne(Print=riter$con1.getO"tp"tStream$'8tr"e';

<"fferedReader inp"t,ne( <"fferedReader$ne(Inp"tStreamReader$Sy tem.in''; int choice;

do !

choice,Integer.par eInt$command Hrom lient.read-ine$''; String file; #yte line%&,n"ll; Hile f; (itch$choice'

! ca e

1:Sy tem.o"t.println$01. )+?0'; file,command Hrom lient.read-ine$';

f,ne( Hile$file'; int inde ,file.la tInde Of$0.0';

String type,file. "# tring$inde 21'; re pon eTo lient.println$type';

long length,f.length$'; re pon eTo lient.println$length';

#rea7;

ca e 5:Sy tem.o"t.println$05.POST0'; file,command Hrom lient.read-ine$';

Sy tem.o"t.println$0@)SS+ ) POST)? HRO@-I) T:0';

Page 33: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 33/39

Sy tem.o"t.println$file'; #rea7;

ca e G:Sy tem.o"t.println$0G. )T0';

file,command Hrom lient.read-ine$';HileInp"tStream fi ,ne( HileInp"tStream$file';

(hile$fi .availa#le$'E,3' !

if$fi .availa#le$'41356' line,ne( #yte%fi .availa#le$'&; el e line,ne( #yte%1356&; fi .read$line'; file,ne( String$line'; re pon eTo lient.println$file'; 9

re pon eTo lient.println$0***0'; fi .clo e$';

#rea7; ca e 6:Sy tem.o"t.println$06.?)-)T)0';

file,command Hrom lient.read-ine$'; f,ne( Hile$file';

f.delete$'; #rea7;

defa"lt:Sy tem.o"t.print$0J.)XIT0'; Sy tem.e it$3';

99

(hile$choice4,6'; con1.clo e$'; 1.clo e$'; 9

9

Page 34: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 34/39

/* CLIENT SIDE PROGRAM */

import java.io.*;import java.net.*;import java.lang.*;import java."til.*;

p"#lic cla htpc ! p"#lic tatic void main$String arg %&' thro( ) ception ! Soc7et con1,ne( Soc7et$0localho t085333'; <"fferedReader re pon eHromServer,ne( <"fferedReader$ne(Inp"tStreamReader$con1.getInp"tStream$'''; Print=riter command ToServer,ne( Print=riter$con1.getO"tp"tStream$'8tr"e'; <"fferedReader inp"t,ne( <"fferedReader$ne(Inp"tStreamReader$Sy tem.in'';

Sy tem.o"t.println$0 O ) T)? TO S)R )R0'; int choice; do ! Sy tem.o"t.println$0 O@@+ ?S0'; Sy tem.o"t.println$01. )+? 5.POST G. )T 6.?)-)T) J.)XIT0'; Sy tem.o"t.println$0) T)R YOAR OI ):0'; choice,Integer.par eInt$inp"t.read-ine$''; #yte line%&,n"ll; String file; (itch$choice'

!

ca e 1:command ToServer.println$010'; Sy tem.o"t.println$0) T)R HI-) +@) TO )T T ) )+?)R:0'; file,inp"t.read-ine$'; command ToServer.println$file'; String type,re pon eHromServer.read-ine$'; String length,re pon eHromServer.read-ine$';

Sy tem.o"t.println$0HI-):02file20TYP):02type20-) T :02length'; #rea7; ca e 5:command ToServer.println$050'; Sy tem.o"t.println$0) T)R T)XT TO POST:0'; file,inp"t.read-ine$'; command ToServer.println$file'; #rea7; ca e G:command ToServer.println$0G0'; Sy tem.o"t.println$0) T)R HI-) +@) TO )T:0'; file,inp"t.read-ine$'; command ToServer.println$file'; Sy tem.o"t.println$0) T)R HI-) +@) TO S+ ):0'; file,inp"t.read-ine$'; HileO"tp"tStream fo ,ne( HileO"tp"tStream$file'; (hile$tr"e' !

Page 35: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 35/39

String ,re pon eHromServer.read-ine$'; if$ .e>"al $0***0'' #rea7; int co"nt, .length$'; if$co"nt41356' line,ne( #yte%co"nt&; el e line,ne( #yte%1356&; line, .get<yte $'; fo .(rite$line'; 9

fo .clo e$'; #rea7; ca e 6:command ToServer.println$060'; Sy tem.o"t.println$0) T)R HI-) +@) TO ?)-)T):0'; file,inp"t.read-ine$'; command ToServer.println$file'; #rea7;

defa"lt:command ToServer.println$0J0'; Sy tem.e it$3'; 9 9 (hile$choice4,6'; con1.clo e$'; 9 9

Page 36: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 36/39

Page 37: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 37/39

Page 38: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 38/39

! String ,re pon eHromServer.read-ine$'; if$ .e>"al $0***0'' #rea7; int co"nt, .length$'; if$co"nt41356' line,ne( #yte%co"nt&; el e line,ne( #yte%1356&; line, .get<yte $'; fo .(rite$line'; 9

fo .clo e$'; #rea7; ca e 6:command ToServer.println$060'; Sy tem.o"t.println$0) T)R HI-) +@) TO ?)-)T):0'; file,inp"t.read-ine$'; command ToServer.println$file';

#rea7; defa"lt:command ToServer.println$0J0'; Sy tem.e it$3'; 9 9 (hile$choice4,6'; con1.clo e$'; 9 9

Page 39: network security lab programs by gitam

8/10/2019 network security lab programs by gitam

http://slidepdf.com/reader/full/network-security-lab-programs-by-gitam 39/39