Network confrontation experiment 2

 

People's Public Security University of China

Chinese people public security university

 

cyber countermeasures

experimental report

 

Experiment 2

Network Sniffing and Spoofing

 

 

 

student name

Li Yuchen

grade

Class of 2015 

District team

District One 

mentor

 Takami

 

 

School of Information Technology and Cyber ​​Security

May 2 , 2018 _ _ _

 

General outline of experimental tasks

20 1 7 —20 1 8th semester 2nd semester _ 

1. The purpose of the experiment

1. Deepen and digest the teaching content of this course, and review the Internet search skills, methods and techniques learned;

2. Understand and be familiar with common network sniffing methods, master the use of common packet capture software and filtering skills, and be able to analyze basic network behaviors for a given data packet; master the basic principles of ARP spoofing and DNS attack methods based on ARP spoofing;

3. To achieve the purpose of consolidating course knowledge and practical application.

2. Experimental requirements

1. Carefully read the content of each experiment. For topics that require screenshots, clear screenshots should be taken and the screenshots should be marked and explained.

2. The document requires a clear structure, accurate graphic and textual expression, and standardized labeling. The reasoning content is objective, reasonable and logical.

3. Software tools can use office2003 or 2007, CAIN, Wireshark, etc.

4. After the experiment is over, keep the electronic documentation.

3. Experimental steps

1. Prepare

Prepare for the experiment in advance. Before the experiment, you should have a detailed understanding of the experimental purpose, experimental requirements and experimental content, be familiar with and prepare the software tools for the experiment, and prepare the experimental content in advance according to the experimental content and requirements.

2. lab environment

Describe the hardware and software environment (including various software tools) used in the experiment;

Power on and start the software office2003 or 2007, browser, Wireshark, CAIN.

3. experiment procedure

1) Start the system and start the tool software environment.

2) Use software tools to realize the experimental content.

4. experimental report

Write the experimental report according to the unified required experimental report format. Embed the document written according to the template format into the experimental report document, the document should be written according to the prescribed writing format, and the tables should have tables and graphs and pictures.

 ARP spoofing 

Then stop capturing packets

filter out ftp

Click to track data flow, you can see the FTP login process in the data package

filter tcp, then find packets with byte data

Click to track data flow

save on desktop

 

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=325357400&siteId=291194637