Network Technology Experiment confrontation REPORT

Chinese People's Public Security University

Chinese people public security university

 

Network Warfare Technology

experimental report

 

The second experiment

Network sniffing and spoofing

 

 

 

student name

Sun Yisen 

grade

2017 

District Team

Five District 17 Network Security 

mentor

Your opinion 

 

 

Information and Network Security Technology College

201 6 Nian 11 Yue 7 Ri

 

Master experimental task

20 1 6 -20 1 7  grade Dai  Ichi  semester 

First, the purpose of the experiment

1. Deepen and digest this course lectures, review what they have learned through the Internet search techniques, methods and techniques;

2. Become familiar with commonly used network sniffer way to master the common packet capture and filtering techniques to use software can analyze network basic behavior of a given data packet; master the basic principles of ARP spoofing, DNS-based attacks and ARP spoofing;

3. The purpose of the consolidation of curriculum knowledge and practical application.

Second, the experimental requirements

1. Carefully read the contents of each experiment, we need to capture the title, to be clear screenshots and annotate screenshots and descriptions.

2. Documentation Requirements clear structure, graphic expression accurate labeling specifications. Reasoning was objective, reasonable and logical.

3. Software tools can be used office2003 or 2007, CAIN, Wireshark and so on.

4. After the experiment, to retain electronic documents.

Three , experimental procedures

1. ready

Experimental preparation well in advance, should learn more about the purpose of the experiment, test requirements and test content before the experiment, familiar with the software tools and ready with a good experiment, in accordance with the requirements of experimental content and experimental content ready ahead of time.

2. lab environment

Describes the hardware and software environment used in the experiment (including a variety of software tools);

Office2003 boot and start the software or 2007, browser, Wireshark, CAIN.

Tools Download:
CAIN https://pan.baidu.com/s/19qDb7xbj1L_2QnoPm71KzA

Wireshark link: https: //pan.baidu.com/s/1BeXghjVV9Mll_cAmeMCTPg Password: mbpv

Mini FTP https://pan.baidu.com/s/16ms4hXVOmMHhDEe3WraRHQ

NetworkMiner  https://pan.baidu.com/s/14e3VluLPjWFKxqNhdpYO9Q

3. experiment procedure

1) Start the system and start-up tool environment.

2) realization of experimental content using software tools.

4. experimental report

Write lab reports in accordance with the standard requirements of the test report format. The document prepared in accordance with the format template embedded test report document, the document written in accordance with the provisions of the written format, the form must be said that the graphics have a table Illustrated.

The first part of the ARP spoofing 

 

1. a set of two students, the following experiment was conducted topology environment shown in FIG.

2. longitudinal spoofing attacks by Arp-a command to verify successful deception (screenshot attached)

3. The process of deception, the host A is turned Wireshark capture, analyze the characteristics of the data packet spoofing attacks APR process. (Screenshot attached)

4. The process of deception, open Wireshark capture performed in the host C, analysis of the FTP protocol login procedure (flowchart attached)

5. After the completion of deception, the host C is successfully acquired user name and password FTP (screenshot attached)

ARP spoofing attacks procedure shows (for reference only)

1, a virtual machine between two experiments, A virtual machine used to make the attacker, IP address is 192.168.226.129, B virtual machine used to make the victims, IP address is 192.168.226.128, they shared two machines a gateway is 192.168.226.2

ARP spoofing pre-B virtual machine IP is 192.168.226.128

 

 

2. A virtual machine running on a cain, select the sniffer card (single card, you can default), click on the card icon in the toolbar, then select sniffer page, then select the hosts, the right to select the lower left corner of the "scan MAC address ", active host IP scan LAN and MAC address

 除网关外,扫描到了攻击目标192.168.226.128和主机192.168.226.1(开设虚拟机的主机),如下图

3、选中ARP页-》点下列表栏空白处,大加号变为可选-》点大加号,在弹出的窗口中选择要嗅探的目标主机(注意这里的选择和单击欺骗嗅探不一样,左面直接点网关,其它机器自动出现在右侧列表中,这时需要按住ctrl键在右侧选择你需要嗅探的主机,点oK按钮,回到软件主窗体,如图所示(这是欺骗两台机器)

4、点击工具栏第三个图标(start ARP)就可以ARP欺骗

下图为欺骗开始后在192.168.226.128机器上用arp –a命令查询本机arp缓存表的情况,会发现缓存表中的网关对应的MAC地址变成了192.168.226.129号机(实施ARP欺骗的机器)的IP地址

5.欺骗过程中在受害者B上开启wires hark抓包,分析数据包的特点

第二部分 DNS

 

 1. 两个同学一组,攻击者A和受害者B。

2.A同学正常访问网站www.ppsuc.edu.cn

3.B同学扮演攻击者,设计攻击方法,使用CAIN,通过DNS欺骗的方式,让A同学访问www.ppsuc.edu.cn网址的时候,访问到另外一台机器上的伪造网站

 在CAIN中添加DNS欺骗选项,www.ppsuc.edu.cn的原ip为121.194.212.126,如下图,希望欺骗到172.22.149.98,因此

欺骗成功后,在被害机器上查看www.ppsuc.edu.cn的IP 查看是否被解析到了指定的IP地址上。

第三部分 FTP协议分析

 

1. 两个同学一组,A和B。

2.A同学架设FTP服务器,并设置用户名和密码,例如jkn/jkn

3.B同学在机器中安装Wireshark,并将其打开;之后用用户名和密码登陆A同学的FTP服务器,并上传一张图片。

 

 

4.B同学停止Wireshark抓包,并和A同学一起分析数据包中的FTP登录过程,还原登录用户名和密码,以及上传文件。

 

 

 

 

Guess you like

Origin www.cnblogs.com/P201721450014/p/11834511.html