Everyone wants a nice wonderful, looks like your attitude determines your life!
==============================
focus!
Manner!
------------------------------
1, Port Security
------ intranet prohibit private access network equipment
[SW] interface G0 / 0/2
[SW-the GigabitEthernet0 / 0/2] // Port-Open Security enable port security
[sw-GigabitEthernet0 / 0/2 ] port-security mac-address sticky // set port MAC adhesions
[ sw-GigabitEthernet0 / 0/2] max-mac-num number port-security 1 // set the maximum host port blocking
[Sw] display mac-address sticky // Check MAC address table adhesions
2, blackmail and virus protection
Trojan: theft, control of the
virus: the destruction, self-replication, the infection
increasingly blurred!
----------
extortion virus 2017 Enterprise Server ---- bitcoin (virtual currency, digital currency)
2018 --- personal micro-channel
2019, part of the government, state-owned enterprises, institutions
Extortion virus protection:
- pull the network cable
- update patch
- data backup! ! !
- improve safety awareness
- turn off the firewall port 445
---- network printer
Set up a firewall port 445:
- Open Network and Sharing Center Advanced settings ---- ---- ----- Inbound Rules New Rule port ---- --- --- link a particular port to block 445-- name
3, KALI system ----- free open source. A collection of tools. To infiltrate such a system test and safety assessment.
4, the mounting system KALI
5, scanning tools
use software tools to scan the target network or host, to obtain information system type, version, port, and other vulnerabilities
Attackers: attack
attack software
Protection personnel: plugging loopholes
reinforcement system
========================
ifconfig see card information
dhclient initiative to obtain card information
========= ===============
nMAP a powerful scanning tools
format: nmap scan type option on the scan target
scan type: -sS half-open scanning ------ the most common scanning
- sT full scan
-sU UDP scanning
-sP ICMP scanning
6, experimental environment: one KALI
a 2003 --- NIC mode to host mode only consistent VM1 ---
--- test connectivity
## KALI: ifconfig View IP address
root @ kali: ~ # nmap -sS -p 3389 192.168.0.129 // half-open by the scanning information scans the host port specific
root @ kali: ~ # nmap -sS 192.168.0.129 // half-open port scan by scan host information
root @ kali: ~ # nmap -sS 192.168.0.129-145 // half-open by host scans a scan range information
## 2003: ipconfig to view the IP information
---- --- open packet capture software to scan half-open type
7, brute -------- exhaustive
generated dictionary: crunch
Format: crunch 6 6 abc12345 -d 2 pa111.txt -o
------ ------- ------------- -------- ------- ---- -------
minimum maximum password password password-character password composed of the number of consecutive output dictionary name
8, experimental environment:
a 7 win
--- desktop software files in the folder hydra folder, hold down the shift key,
a dialog box appears - open command line here ----- input instruction break!
Consistent with a 2003 ----- NIC mode, interworking
--- open Remote Desktop
the -l Administrator -P pa123.txt 192.168.0.129 Hydra RDP
---- ---------------- ---- ------------- - ---------------- ------------
small L P designated administrator account password dictionaries big target host remote Desktop program
9, the local security policy management tool --- ---- --- account lockout policy to prevent brute force
gpupdate / force to force a refresh Group Policy