20,199,120 2019-2020-2 "network attack and defense practice," the second week of work

20,199,120 2019-2020-2 "network attack and defense practice," the second week of work

Foreword

operation answer
This work belongs courses Network attack and defense practice
Where this requirement in the job Second job - to build a network attack and defense practice environment
My aim in this course is Learning, improve network attack and defense skills
In particular aspects of the job which helped me achieve goals Learning and practicing offensive and defensive environment to build detailed process

1. knowledge carding and summary

1.1 Composition of experimental environment network attack and defense

① drone learn: Contains system and application security vulnerabilities, and host target as. According to the current popularity of the operating system, the basic environment should be included in WindowsXP and Linux host operating systems.
② attack aircraft: attack install some special software for host-initiated network attacks. Have more stronger attack on the Linux operating system platform software, compared to Windows, it is more suitable as attack platforms.
③ attack detection, analysis and defense platform: the optimal position is drone gateway, the gateway host can be constructed based on the Linux operating system, and it includes a variety of software by integrating network attack detection, analysis and defense functions; in addition also on the drone system security log analysis comes or additional tools.
④ network connection: the target aircraft, attack aircraft, and the gateway includes a detection assay defense function connected via a network.

1.2 Composition of experimental environment network attack and defense


A list of the required image installation environment

header 1 header 2
row 1 col 1 row 1 col 2
row 2 col 1 row 2 col 2

2. The offense and defense environment to build detailed process

2.1 Network topology offensive environment

header 1 header 2
row 1 col 1 row 1 col 2
row 2 col 1 row 2 col 2

2.2 network attack and defense build environment

2.2.1 Network Configuration VM environment

VMnet1 disposed below

VMnet8 and a NAT setting VMnet8

DHCP settings of VMnet8

2.2.2 attack aircraft Kail-linux installation

Detailed steps as shown in FIG.


Enter Kali

View IP address

IP address of the attack aircraft Kail-linux is 192.168.200.3

2.2.3windows drone --win2kServer installation

Network Configuration

2.2.4 windows Installation attack aircraft --windows Attacker


Windowsattacker obtained by ipconfig IP address

windows drone --win2kServer IP address 192.168.200.2

2.2.5 Linux drone -Metasploitable2-Linux installation


Network Configuration


Open etc / rc.localvim
added before exit0
ifconfig eth0 192.168.200.125 255.255.255.128 Netmask
route the Add default gw 192.168.200.1


Some instructions about vim

Obtain an IP address


IP address is 192.168.200.125 Linux drone -Metasploitable2

2.2.6 SEEDUbuntu installation

Detail steps are as follows

Network Configuration

Open the system

obtains an IP address

IP address

2.2.7 honeypot Gateway Installation

Follow the steps below step by step to

3. The problems and solutions encountered in the study

Knowledge of this chapter is quite simple, basic can understand.

4. Learning perception, thinking, etc.

Network leaks events happen all the time, everyday life, not just two-dimensional code scanning. In my primary school classmates, for example, do not post pictures online with privacy, etc.

Reference material

Guess you like

Origin www.cnblogs.com/wangchenqq1021/p/12466868.html