3569659661

3569659661




Lab 12 — Network Snllfing/IDS


Lab 12 — NetWork Sniffing/IDS

Lab Scen ario

Nctwork attacks...it is interesting how our common defenses may not work m our new virtual emrironments. Many companies have implemcntcd port security on the physicał network only to have that not implemented in the server en\/ironment due to so many macs coming through on physicał ports in a virtua/ or cloud environment. MWHA does utilize virtualization so we are going to be performing many network based attacks to test the response of the internat network at the MWHA datacenter.

Lab Duration

Time: 90 Minutes


Lab Sections

1. Capturing FTP password with Wireshark

2. Performing MitM with Cain

3. Performing MitM yyith sslstrip

Lab Resources Windows lO VM Debian VM Kali VM

Section 1 — Sniffing Passwords with Wireshark

1. Start Wireshark on your Kali Linux VM.

2. Now, choose the interface you want to use for capturing packets a. In this case, you will use ethO (might be ethl)\


>■


a


i


ar


Page 1222


Certified Penetration Testing Engineer -


v05.l5


©Milp? — Ali Ricrhtc Dnr''*'


■* K o,


usbcnon2

<S> Random packet generator randpkt

3. Click Capture -> Capture FWters

a. Wireshark has many capture h\ter opt\ons. 1 ake a \ook at them,hut do not changes.

i.    Ethernet Mdress 00 OC .29 AK .aa CC

1. Capture data to or Wom the gwen h/\ftC address.

ii.    \P Address 192.16a.X.X

1. Capture data to or Horn the gwen \P address.

iii.    No ARP

1. Do not capture any ARP trah\c.

iv. TCP On\y

1. On\y capture TCP traft\c.

v.    HTTP TCP Port ^


T w ^»nh«rti    MWkyt*'

Vuiyi*    \    1    .    «...

»*• łr»| W«*t»w, IcwK

Wekome toW«t?shark

Capture

_us\ng this f*\er

»Y

Loopbatk: Vo nttog nfqueue usbmonl


1. On\y capture TCP HTTP traftc.

vi.    There are manv morę a\/a\\ab\e and \t \s recommende h\es, we w\W \eave \t b\ank to capture evier^tb\ng\

vV\.

2. Click the Options ® button

rortifipH PpnetrationTestlng tngmeer - vOS.lS



Wyszukiwarka

Podobne podstrony:
DSC00 (12) 5 The; tree was only three metres high. Now it is fot The piane The piane. -.......
00013 ?5c5a58795d3d3cd940c33cedaf2990 12 Woodall & Faltin We maintain, moreover, that before a
skanowanie0075 (3) 12.1.1.5. Real Iife vs. classroom listening In real life listening is easier beca
rulespage5 Automatic Failure. A roli of 11 dr 12 rcsulls in automat-ic failure ot the attack. no mat
skanowanie0075 (3) 12.1.1.5. Real Iife vs. classroom listening In real life listening is easier beca
skanowanie0075 (3) 12.1.1.5. Real Iife vs. classroom listening In real life listening is easier beca
skanuj0008 (340) 8. 9. 10.11.12. 13. 14. Mary is a very_student, never failing to do her homework. D
Diatom Lab s NANO-ADHESIVE for micromanipulated diatoms is INVISIBLE even to Scanning Electron Micro
12 3 1 ZOPABorder price It is the lowest value which is corwenient to us, on which we accept the tra
pack, you will not be able to do some of the laboratory activities and therefore it is important you
12:30 ▼ A ■HOME    O, :REGULER USEFULL SHOE Reguler cool shoes is a great every day t
2a Wskazówki, schematy i wykrój do modelu 12 ze str. 24Turkusowe bolerko Rozmiar: 3R 38 Matori.it. 2
3 16 Choose the Host naMe Every Debian systeM has a naMe - euen if it is not on a network. This naMe
12 tracheal gili system was as yet poorly developed, it mtist have been sluggish and slow in develop
MySQL Cluster HardwareSoftwareand Networking Requirements One of the strengths of MySQL Cluster is t
12 M. Sajewicz et al. From this comparison it is apparent that for three of the five sagę species in
47 (397) 2.12.2C. Therapy for the levator scapulae. When P’s shoulder is painful. Starting Position:

więcej podobnych podstron