20,199,326 2019-2020-2 "network attack and defense practice," the second week of work

summarize

This week learning the second chapter network attack and defense practice, this chapter describes the experimental environment of a network attack based on virtualization technology as well as some of the more famous of the network attack and defense conference.

Famous is the world's Defcon and Black Hat . Both meetings are from Jeff Moss initiated.

The most famous is the focus of a hacker by the security team ( XFocus ) sponsored by the Information Security Technology Focus Summit ( XCon ).

Offensive and defensive environment to build detailed process

Pre-preparation
VMware workstation //自行百度下载,搜索激活码激活即可
VM_Win2kServer_SP0_target.rar //以下所有文件均在老师给的百度网盘链接里,下载下来即可
VM_WinXPattacker.rar
SEEDUbuntu9_August_2010.tar
roo-1.4.hw-20090425114542.iso
Network Topology FIG.

Process flow chart
graph LR A [VMWare Configuration] -> B [mounting attack aircraft] B -> C [mounting drone] C -> D [mounting SEED] D -> E [Installation and Configuration Honeywall] E - -> F [test Honeywall remote management] F -> G [test connectivity]
A, VMWare configuration

Editing in VMware -> Virtual Network Editor

Select VMnet1, provided below

Select VMnet8, provided below

Click NAT settings, set as follows

Click DHCP Settings, set the following

Second, the installation attack aircraft

Decompression VM_WinXPattacker.rar, will produce a folder WinXPattacker

In VMware File -> Open, locate the WinXPattacker, which has a vmx ending the file, open it attack aircraft hardware configuration of the virtual machine (Click on Edit virtual machine settings)

Then start the virtual machine, enter inside the command line, type ipconfig to see ip address

Third, the installation drone

Decompression VM_Win2kServer_SP0_target.rar, will produce a folder Win2kServer_SP0_target

在VMware中 文件 --> 打开,找到Win2kServer_SP0_target,里面有个以vmx结尾的文件,打开它 配置靶机虚拟机的硬件(点击编辑虚拟机设置)

然后启动虚拟机,打开网络连接,设置ip地址,子网掩码,默认网关,dns,如下图

四、安装SEED

解压SEEDUbuntu9_August_2010.tar,得到SEEDUbuntu9_August_2010文件夹

  1. 在VMware中 文件 --> 新建虚拟机

  2. 自定义安装

  3. 稍后安装系统

  4. 选择linux,版本ubuntu

  5. 使用现有虚拟磁盘

  6. 选择seedubuntu的vmdk文件

  7. SEEDUbuntu的网卡设置如下,查看seed的ip,用ifconfig命令

五、安装与配置蜜网网关

安装流程

  1. 在VMware中 文件 --> 新建虚拟机

  2. 选择自定义安装

  3. 硬件兼容性选6.5-7.x

  4. 稍后安装操作系统

  5. 客户机操作系统为Linux,版本为Centos5及更早版本

  6. 虚拟机名称和位置自定义把

  7. 处理器数量默认即可

  8. 内存改为256MB

  9. 网络连接使用NAT

  10. LSI LOGIC

  11. 创建新虚拟硬盘

  12. 最大磁盘大小8G,存储为单个文件

  13. 添加两块网卡,适配器2设置为仅主机模式,适配器3设置为NAT,指定CD/DVD路径为roo-1.4.hw-20090425114542.iso文件所在路径

配置过程

启动蜜网虚拟机,进入如下安装界面。键入回车键确认开始安装,蜜网网关软件安装完毕,进入登录界面

登录蜜网网关,账户名roo 密码honey,并获取root权限,在输入用户密码后会进入配置界面

选择4 Honeywall Configuration进行配置

选择Defaults配置方式

接下来会rebuid,稍等片刻

重新选择4 HoneyWall Configuration

选择1 Mode and IP Information

选择2 Honeypot IP Address

选择5 LAN Broadcast Address

选择6 LAN CIDR Prefix

回到主界面选择4 HoneyWall Configuration

选择2 Remote Management

选择1 Management IP Address

选择2 Management Netmask

选择3 Management Gateway

选择7 Manager,设置可以管理蜜网网关的远程控制端IP范围,以CIDR格式填写,可有多个IP网段,中间用空格分隔

Sebek服务器端配置

回到主界面选择4 HoneyWall Configuration 选择11 Sebek

目标端口选择为1101,Sebek数据包处理选项选择为Drop

六、测试蜜网网关远程管理

测试walleye远程访问 在192.168.200.2这台虚拟机上访问https://192.168.200.8 , 结果如下

出现一个修改密码的界面,按要求修改密码之后,进入如下界面

七、测试连通性

在攻击机主机上ping虚拟机蜜罐IP

在虚拟机蜜罐上ping攻击机虚拟机IP

在蜜网网关上监听ICMP ping包是否通过外网口和内网口

seedping攻击机的时候

学习中遇到的问题及解决

问题1:honeywall虚拟机创建后出现INIT:id"x"respawning too fast : disabled for 5 minutes
解决方法:创建虚拟机时选择稍后安装操作系统即可
问题2:honeywall执行tcpdump命令后退不出来,seed执行ping命令退不出来
解决方法:输入 ctrl+ c即可

学习感想和体会

这次学习刚开始一头雾水,在参阅官方文档和同学博客后,一步一步的搭建好了实验环境。这次搭建环境涉及的知识量挺大的。对网络基础知识有了一个很好地复习。

Guess you like

Origin www.cnblogs.com/funmary/p/12443283.html