Network technology lab report against four

School number 201 721 240 019

 

Chinese People's Public Security University

Chinese people’ public security university

 

Network Warfare Technology

experimental report

 

Experiment 4

Malicious code technology

 

 

 

student name

 Cong Xin

grade

 2017

District Team

 Network Security seven districts

mentor

 Your opinion

 

 

Institute of Technology and Information Network Security

2019 Nian 12 Yue 23 Ri


Master experimental task

2016-2017  school year, Di Yi semester  

First, the purpose of the experiment

1. With practice for the Trojans, so that readers understand and master the Trojans spread and mechanisms of operation; manually delete the Trojan, the Trojan checks to grasp and remove Trojans skills, learn Trojan defense-related knowledge, enhance awareness of security for the Trojans.

 

2. Understand and are familiar with common network attack tools, the basic functions of Trojans;

3. The purpose of the consolidation of curriculum knowledge and practical application.

Second, the experimental requirements

1. Carefully read the contents of each experiment, we need to capture the title, to be clear screenshots and annotate screenshots and descriptions.

2. Documentation Requirements clear structure, graphic expression accurate labeling specifications. Reasoning was objective, reasonable and logical.

3. Software tools are available NC, MSF and so on.

4. After the experiment, to retain electronic documents.

Third, the experimental procedures

1. ready

Experimental preparation well in advance, should learn more about the purpose of the experiment, test requirements and test content before the experiment, familiar with the software tools and ready with a good experiment, in accordance with the requirements of experimental content and experimental content ready ahead of time.

2. lab environment

Describes the hardware and software environment used in the experiment (including a variety of software tools);

Office2003 boot and start the software or 2007, browser, encryption and decryption software.

3. experiment procedure

1) Start the system and start-up tool environment.

2) realization of experimental content using software tools.

4. experimental report

Write lab reports in accordance with the standard requirements of the test report format. The document prepared in accordance with the format template embedded test report document, the document written in accordance with the provisions of the written format, the form must be said that the graphics have a table Illustrated.

 

A task using the NC control computer

 

 NetCat, with a network of Saber said it small and lean and powerful features make it small and lean, because his software has now been compressed to the size of only a dozen KB, but no reduction in functionality.

 

Experimental procedure requires two students with the completion of each other:

 

step one:

 

   The machine (student A) the victim
enter the following command:
  nc.exe the -l -p -e cmd.exe Port enter a listening mode

 

 

 

 

 

 

 

 


Step two:
  the attacker's machine (students B).
Enter the following command:
  NC // Port IP connection victim_IP, then get a shell. (Screenshot required)

 

 

 

 

 

 

 

Step three:

 

    In the shell, using the net user username password / add, add a user, and use the net user command to verify the victim's machine. (Screenshot required)

 

 

 

 

 

 

 

 

 

 

 You can continue through the command line to do something.

 

Task two Trojans control the use of computer

Tools:

https://pan.baidu.com/s/1ipOkdU2HTPFtgU6fF669Gg

https://pan.baidu.com/s/1ajmRKsnv5XvFrKWzszDYwQ ( standby, another Trojan)

 

Experimental procedure requires two students with:

 

step one:

 

    The attacker's machine. (Student A)
open V2014.exe program or the star RAT, similar to the two Trojan functionality.

 

 

 

 

 

 

 

 

 


Step two:
  Click on the menu bar of the "service generated" in the pop-configuration server, the configuration back to even the IP address (the attacker IP) and port number , and click the "Generate" button to generate a Trojan server.

 

 

 

 

 

 

 

Step three:

 

The resulting Trojan executable copy to the victim's machine, and double-click to run. 

 

Step Four:

 

See Trojan line in the case of the control terminal, and a function test and each shots.

1. File Manager, try to copy files

2. Screen control, try to get the desktop

 

 

3. keyloggers, try to get the other keystroke logging

 

 

 4.会话管理,重启对方机器,查看是否能自启动上线

 

 

 

 

会话管理,卸载对方的木马。

 

任务三 Android远控实践  所有过程截图写博客

 相关工具下载:

需要先安装.net framework4.0 (自行搜索下载)

spynote及环境工具:(解压密码rekings.com)

 

 

链接:https://pan.baidu.com/s/1TfPULyW2zvGOeJ_SOXUvSw
提取码:eufr

 

android模拟器:

https://www.yeshen.com/

http://mumu.163.com/

 

实验步骤:

一、攻击者打开spynote软件,该软件需要先安装.netframework4.0和jdk环境。

 

 

 

 

 

 

 

二、配置并打开监听端口

 

    点击Listen Port,在弹出的对话框中输入端口号,并点击Add按钮,最后点击OK,成功监听本地端口。【本过程选用3210端口,实验过程大家可以自己选择端口】

 

 

 

 

 

 

 

三、配置并生成木马

 

(1)点击Build Client按钮,弹出对话框

 (2)配置回连IP和端口,IP地址填写运行spynote的机器IP,端口填写监听的端口号,本次填写3210端口。

 

 

 

 

 

 

 

    (3)配置相关属性信息。

 

 

 

 

 

 

 

    (4)最后点击Build按钮,在选择框中选择和spynote同处在一个文件夹中Patch-release.apk。

 

 

 

 

 

 

    (5)完成后,自动打开APK生成所在的文件夹。

 

 

 

四、将木马安装在Android模拟其中。

 

 

 

 

 

 

 

五、在Spynote中控制手机

 

可以在spynote中看到有一台机器上线,并可以查看其基本信息。

 

 

 

 

在该机器中右键,可以看到可以对该机器进行控制的功能,从中选择4个以上的项目进行实验。

 

 

 

 1.打电话

 

2.本机信息

 

3.文件信息

 

4.地点信息

 

 

 

 

 

 

 

 

 

Guess you like

Origin www.cnblogs.com/p201721240019/p/12081938.html