20,199,120 2019-2020-2 "network attack and defense practice," the second week of work
Foreword
operation | answer |
---|---|
This work belongs courses | Network attack and defense practice |
Where this requirement in the job | Second job - to build a network attack and defense practice environment |
My aim in this course is | Learning, improve network attack and defense skills |
In particular aspects of the job which helped me achieve goals | Learning and practicing offensive and defensive environment to build detailed process |
1. knowledge carding and summary
1.1 Composition of experimental environment network attack and defense
① drone learn: Contains system and application security vulnerabilities, and host target as. According to the current popularity of the operating system, the basic environment should be included in WindowsXP and Linux host operating systems.
② attack aircraft: attack install some special software for host-initiated network attacks. Have more stronger attack on the Linux operating system platform software, compared to Windows, it is more suitable as attack platforms.
③ attack detection, analysis and defense platform: the optimal position is drone gateway, the gateway host can be constructed based on the Linux operating system, and it includes a variety of software by integrating network attack detection, analysis and defense functions; in addition also on the drone system security log analysis comes or additional tools.
④ network connection: the target aircraft, attack aircraft, and the gateway includes a detection assay defense function connected via a network.
1.2 Composition of experimental environment network attack and defense
A list of the required image installation environment
header 1 | header 2 |
---|---|
row 1 col 1 | row 1 col 2 |
row 2 col 1 | row 2 col 2 |
2. The offense and defense environment to build detailed process
2.1 Network topology offensive environment
header 1 | header 2 |
---|---|
row 1 col 1 | row 1 col 2 |
row 2 col 1 | row 2 col 2 |
2.2 network attack and defense build environment
2.2.1 Network Configuration VM environment
VMnet1 disposed below
VMnet8 and a NAT setting VMnet8
DHCP settings of VMnet8
2.2.2 attack aircraft Kail-linux installation
Detailed steps as shown in FIG.
Enter Kali
View IP address
IP address of the attack aircraft Kail-linux is 192.168.200.3
2.2.3windows drone --win2kServer installation
Network Configuration
2.2.4 windows Installation attack aircraft --windows Attacker
Windowsattacker obtained by ipconfig IP address
windows drone --win2kServer IP address 192.168.200.2
2.2.5 Linux drone -Metasploitable2-Linux installation
Network Configuration
Open etc / rc.localvim
added before exit0
ifconfig eth0 192.168.200.125 255.255.255.128 Netmask
route the Add default gw 192.168.200.1
Some instructions about vim
Obtain an IP address
IP address is 192.168.200.125 Linux drone -Metasploitable2
2.2.6 SEEDUbuntu installation
Detail steps are as follows
Network Configuration
Open the system
obtains an IP address
IP address
2.2.7 honeypot Gateway Installation
Follow the steps below step by step to
3. The problems and solutions encountered in the study
Knowledge of this chapter is quite simple, basic can understand.
4. Learning perception, thinking, etc.
Network leaks events happen all the time, everyday life, not just two-dimensional code scanning. In my primary school classmates, for example, do not post pictures online with privacy, etc.