20,199,318 2019-2020-2 "network attack and defense practice," the second week of work

20,199,318 2019-2020-2 "network attack and defense practice," the second week of work


1. knowledge carding and summary

A network-based attack and defense test environment requires the following components:

  • Drone: Contains system and application security leak run, and as the host of the target. According to the current popularity of the operating system, the basic environment should be included in Windows XP and Linux host operating systems.
  • Attack: attack install some special software for host-initiated network attacks, have more stronger attack on the Linux operating system platform software, compared to Windows, is more suitable as attack platforms.
  • Attack detection, analysis and defense platforms: the best location is the gateway machine can be Linux-based operating system to build a gateway host, and make it function with network attack detection, analysis and prevention by integrating a variety of software: Also on the drone also by self tool belt or additional system security log analysis.
  • Fi: A drone, attack detection analysis and gateway includes a defense function to connect through the network.

2. Virtual Honeynet network topology


3.VM Network Configuration

In the last semester "Linux kernel principle" course VM installed. VM network configuration is as follows:




4. Install Virtual Machine Attack Machine

Open already downloaded the virtual machine, and then follow the steps to configure in vm in:



The virtual machine installed drone




6. Install Honeywall virtual machine

Vm create a virtual machine, as illustrated in the following specific steps:









7. Install the software Honeywall

To start the first step on the installed Honeywall virtual machine. And then step by step:














8. Installation Configuration SEEDUbuntu







9. Test

First input https://192.168.200.8 in attack aircraft. Account: roo. Password: honey. Then change the password.




Switch to roo and enter a command as shown below:

ping drone attack on the machine:

Honeynets listening information:

on the drone ping Attack:

Honeynets listening information:

on SEED ping Attack:

Honeynets monitor information:


Problems and solutions encountered in the study 10

  • One problem: the virtual machine appears "INIT: ID" when installing Honeywall virtual machine X "respawning too fast: disabled for 5 minutes" error.
  • A solution to the problem: select other versions of Linux.

11. study perception, thinking

  本次作业极大的考验了本人的动手能力。所以一定要细心、细心、再细心,要不然会浪费很多时间。

Guess you like

Origin www.cnblogs.com/SunMaolin/p/12453302.html