#20222820 2022-2023-2 "Network Offense and Defense Practice" Week 1 Assignment

Table of contents

1. Experimental goals

2. Learning summary

3. Construction of network attack and defense environment

1. Environment topology diagram structure

2. Environment construction process

 4. Experiment summary


1. Experimental goals

Learn the knowledge related to network attack and defense to build the environment, and complete the network attack and defense environment construction.

2. Learning summary

1. Honeypot: a trap to trap attackers.

2. Honeynet: Honeynet uses technology to place the honeypot host behind the firewall. All data in and out of the network will pass through here, and all data in and out of the network will pass through here, and these data can be controlled and captured. This phishing environment becomes a honeynet.

3. Honey Wall: An attack behavior capture and analysis platform provided by Honey Wall as a transparent gateway.

4. Basic network attack and defense environment:

       Target machine: The basic environment should include Windows XP and Linux operating system hosts.

    Attack machine: Install some special attack software, and the Linux operating system platform is more suitable.

       ​ Attack detection, analysis and defense platform: The best location is the gateway of the target machine.

       Network connection: Connect the above three through the network.

3. Construction of network attack and defense environment

1. Environment topology diagram structure

2. Environment construction process

Create a new virtual machine and set up virtual network.

 Make IP settings

Follow the settings below.

Set IP address range.

Enter the virtual machine and set up a local network connection.

 

 Use the command to query the IP address.

 

 You can see the IP and subnet mask, press esc, :wq to exit.

 Use the command to query the IP.

 

 Then set up three attack virtual machine networks of Kali, WinXPattacker, and seed.

 

 

 

 Open the terminal in the Ubuntu virtual machine and query the IP address of seed. In the attacking network segment, the other two IP addresses are also in the attacking network segment.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 4. Experiment summary

1. Through this experiment, I built a network attack and defense environment by myself, and gained a better understanding of environment attack and defense tools. Although I followed the tutorial step by step, there are still some differences from the tutorial, so you must build it according to your own understanding.

2. The problems encountered are explained in the text description of the picture.

Guess you like

Origin blog.csdn.net/weixin_44226607/article/details/129309664