Port / kali hacker system / extortion virus 1

Disclaimer: This article is a blogger original article, follow the CC 4.0 BY-SA copyright agreement, reproduced, please attach the original source link and this statement.
This link: https://blog.csdn.net/qq_30787727/article/details/100060576

Everyone wants a nice wonderful, looks like your attitude determines your life!
==============================
focus!
Manner!
------------------------------
1, Port Security     
            ------ intranet prohibit private access network equipment

[SW] interface G0 / 0/2    
[SW-the GigabitEthernet0 / 0/2] // Port-Open Security enable port security
[sw-GigabitEthernet0 / 0/2 ] port-security mac-address sticky // set port MAC adhesions
[ sw-GigabitEthernet0 / 0/2] max-mac-num number port-security 1 // set the maximum host port blocking

[Sw] display mac-address sticky // Check MAC address table adhesions


2, blackmail and virus protection
     
     Trojan: theft, control of the
     virus: the destruction, self-replication, the infection  
  
     increasingly blurred!

   ----------
 extortion virus 2017 Enterprise Server ---- bitcoin (virtual currency, digital currency)
                        2018 --- personal micro-channel      
                        2019, part of the government, state-owned enterprises, institutions

Extortion virus protection:
    - pull the network cable
    - update patch  
    - data backup! ! !
    - improve safety awareness
    - turn off the firewall port 445
                        ---- network printer


Set up a firewall port 445:
    - Open Network and Sharing Center Advanced settings ---- ---- ----- Inbound Rules New Rule port ---- --- --- link a particular port to block 445-- name


3, KALI system ----- free open source. A collection of tools. To infiltrate such a system test and safety assessment.
 
4, the mounting system KALI  

5, scanning tools
       use software tools to scan the target network or host, to obtain information system type, version, port, and other vulnerabilities

   Attackers: attack
                  attack software

   Protection personnel: plugging loopholes
                      reinforcement system
========================
ifconfig see card information
dhclient initiative to obtain card information
========= ===============
nMAP a powerful scanning tools 
format: nmap scan type option on the scan target
           
            scan type: -sS half-open scanning ------ the most common scanning
                               - sT full scan
                               -sU UDP scanning
                               -sP ICMP scanning


6, experimental environment: one KALI   
                      a 2003 --- NIC mode to host mode only consistent VM1 ---
                          --- test connectivity

## KALI: ifconfig View IP address

  root @ kali: ~ # nmap -sS -p 3389 192.168.0.129 // half-open by the scanning information scans the host port specific
  root @ kali: ~ # nmap -sS 192.168.0.129 // half-open port scan by scan host information
  root @ kali: ~ # nmap -sS 192.168.0.129-145 // half-open by host scans a scan range information

## 2003: ipconfig to view the IP information
    ---- --- open packet capture software to scan half-open type
 
7, brute -------- exhaustive
generated dictionary: crunch
Format: crunch 6 6 abc12345 -d 2 pa111.txt -o
                           ------ ------- ------------- -------- ------- ---- -------
                           minimum maximum password password password-character password composed of the number of consecutive output dictionary name

8, experimental environment:
    a 7 win
           --- desktop software files in the folder hydra folder, hold down the shift key,
                a dialog box appears - open command line here ----- input instruction break!

    Consistent with a 2003 ----- NIC mode, interworking
                       --- open Remote Desktop


the -l Administrator -P pa123.txt 192.168.0.129 Hydra RDP
           ---- ---------------- ---- ------------- - ---------------- ------------
           small L P designated administrator account password dictionaries big target host remote Desktop program

9, the local security policy management tool --- ---- --- account lockout policy to prevent brute force
     gpupdate / force to force a refresh Group Policy


      


                                               
     


 

Guess you like

Origin blog.csdn.net/qq_30787727/article/details/100060576