20,199,311 2019-2020-2 "network attack and defense practice," the second week of work

problem Reply
This work belongs courses https://edu.cnblogs.com/campus/besti/19attackdefense
Where this requirement in the job https://edu.cnblogs.com/campus/besti/19attackdefense/homework/10449
My aim in this course is The second chapter learning materials, the use of virtual machines to build the network reactive anti-practice environment
In particular aspects of the job which helped me achieve goals Network-related work to build anti-environment

1. learning summary

Introduction 1.1 Network attack and defense test environment

  • Drone: Contains system and application security vulnerabilities and targeted attacks as the host. Basic environments, including Linux and Windows operating systems.
  • Attack: attack install some special software for host-initiated network attacks.
  • Attack detection, analysis and defense platforms: the best location is drone of a gateway, can be based on the Linux operating system to build a gateway host, and by integrating it with a variety of software network attack detection, analysis and defense capabilities.
  • Fi: A drone, attack detection analysis and gateway includes a defense function to connect through the network

1.2 network attack and defense test environment configuration

I configured the network attack and defense test environment includes six different types of virtual machine images, respectively, as the drone of Linux Metasploitable and Windows 2000, as attack aircraft Kail Linux and Windows XP Attacker, as the detection and prevention platform HoneyWall, and a SEED virtual machine images.

2. The detailed process of attack and defense build environment

2.1 network topology map offense and defense practice

image description

2.2 Network Settings

Open VMware Workstation, Edit -> Virtual Network Editor, configure the network settings for the three modes
VMnet0 bridge mode
image description
VMnet1 host-only mode
image description
VMnet8 NAT mode
image description
NAT gateway settings
image description
DHCP address assignment setting
image description

2.3 Installation attack aircraft

2.3.1 Linux attack aircraft Kail Linux

Ios image downloaded from the official website, by the new virtual machine -> Typically, and follow the steps to install, set the network adapter after the installation is completed, select custom VMnet8
image description
used sufor lifting weights, using the ifconfigcommand to view the ip address Kail
image description

2.3.2 Windows Windows Attacker attack aircraft

Teacher to use the resources that can be directly extracted, import vmx file, the network adapter is set to NAT mode
image description
image description
into the system, run cmd, use the ipconfigcommand to view the ip address
image description

2.4 Installation drone

2.4.1 Linux drone Metasploitable2-Linux

Ibid installation, only the network adapter to the host mode set
image description
into the system, the following operation is manually set address ip

sudo su
vim /etc/rc.local
#在exit0之前添加如下代码
ifconfig eth0 192.168.200.125 netmask 255.255.255.128
route add default gw 192.168.200.1
#保存退出重启
reboot

image description
Enter the ifconfigview ip address
image description

2.4.2 Windows drone Windows 2000

Ibid installation, network adapters to master mode only
image description
prompted to enter the system
image description
set the network parameters
image description

2.5 SEEDUbuntu installation

SEEDUbuntu by VM virtual machine disk image given vmdk, vmdk SEEDUbuntu by VM virtual machine disk image given, choose New Virtual Machine -> Custom Installation -> Compatible -> install the system later -> choose linux, version ubuntu-> Name location -> continuous settings hardware -> use an existing virtual disk, select seedubuntu of vmdk file -> Next, the network adapter is set to VMnet8 custom
image description
use into the system suprivilege escalation, ifconfigsee the ip address
image description

2.6 Honeywall Installation and Configuration

2.6.1 Honeywall installation

Honeywall step more complicated to install and set, as shown in step images
image description
image description
image description
image description
image description
image description
image description
image description
image description
image description
network adapter disposed below
image description
into the system
image description
image description
image description
successfully installed

2.6.2 Honeywall configuration

Use the command su -to enter the configuration page, as shown in FIG configuration process
image description
image description
image description
image description
image description
image description
image description
image description
image description
image description
image description
image description
image description
image description
image description
image description
image description
image description
image description
image description
image description
image description
image description
image description
image description
using windowsAttacker, browser to open https://192.168.200.8, see the following interface
image description
required password modification, the following interface
image description

2.7 test network connections between virtual machines

First, switch to the honeypot by su -lifting weights, run commands tcpdump -i eth0 icmp, monitor connectivity
Kail ping Windows 2000
image description
image description

Windows Attacker ping Windows 2000
image description
image description

Windows 2000 ping Windows Attacker
image description
image description

Metasploitable2-Linux ping Kail
image description

image description

SEEDUbuntu ping Windows 2000
image description
image description
bridge function properly

3. problems encountered in the study

  • Question 1: For the connection mode concept vm of three networks is not very clear.
  • Problem 1 Solution: Internet to collect information, in-depth understanding of the differences of these three models.

4. Learning feelings and experience

Network attack and defense build experimental environment for me is a difficult thing, but fortunately, by reading the teacher as well as a reference document given other students the blog set up successfully completed. The experiment exposed the problems of my own hands-poor, to think more about the future, more practice, to improve their capacity in this area.

Reference material

VMware network connection mode - bridging mode, NAT mode, and only the difference between the master mode and the introduction

. Jianwei Zhuge Lesson 2 Handout: Building a lab environment based on network attack and defense VMNet third generation honeynet

Guess you like

Origin www.cnblogs.com/w-a-n-s-d-j/p/12450732.html