20,199,309 2019-2020-2 "network attack and defense practice," the third week of work

This work belongs courses https://edu.cnblogs.com/campus/besti/19attackdefense
Where this requirement in the job https://edu.cnblogs.com/campus/besti/19attackdefense/homework/10471
My aim in this course is
In particular aspects of the job which helped me achieve goals
Text of the job 1. The practice content, 2. practice, 3. problems and solutions encountered in the study, 4. practice summary
Other references See the last part of the body

1. Practice content

Capitol Network

Capitol network refers to the collection of information by an attacker in a planned, step by step to the target organization or individual to understand the network environment and information security targets, the technical process to get a complete analysis of target figure.

  • Goal: for the organization, can be used to detect specific domain name, network address range, directly accessible on the Internet
    IP
    address and network services, network topology, phone number segment, email lists, and so on; For individuals, including identity information, information, career, and even some personal privacy information.
  • Means: Web information search and mining; DNS queries and IP; network topology investigation.

Network Scanning

Network scanning is to confirm the work program of the host running the network, or to attack the host, or to network security assessment. Network scanners, such as Ping fire and port scanning, return on which IP addresses are mapped to the host connection and works on the Internet, what kind of information services provided by these hosts. Another method is to scan the reverse map, the return on which IP addresses are mapped out the information activities of the host, which could allow an attacker is assumed that a viable address. The main function:

    1.扫描目标主机识别其工作状态(开/关机)

    2.识别目标主机的端口状态(监听/关闭)

    3.识别目标主机系统及服务程序的类型和版本

    4.根据已知漏洞信息,分析系统脆弱点

    5.生成扫描结果报告
  • Summary: The network scanner function: ① determine the target host is online; ② target host open port status; ③ the target host operating system and related information; ④ the target host system loopholes that may exist.

2. practice

2.1 Task queries a DNS and IP

Task 1: Choose a DNS domain name from google.com, g.cn, baidu.com, sina.com.cn the query to obtain the following information:

  • DNS registrant and contact information
  • The domain name corresponding to the IP address
  • IP address of the registrant and contact information
  • IP address of the host country, city, and specific location

{#section}

  • 1. First of all: access to relevant information whoisSoft.com URL of baidu.com. We can get DNS registrant and contact information.

  • 2. Use the machine enter cmd nslookup baidu.com query baidu.com IP address.

  • 3. whoisSoft.com enter the URL of IP (220.181.38.148), get specific national urban location information.

2.1 Task two attempts to acquire BBS, forums, QQ, MSN in the IP address of a friend, put that query to get the specific location of where your friends are

First, open the Wireshark, select the local network card. Selection string, the packet details, enter 020048. The use of micro-channel computer to call a friend. Then the packet can be obtained wireshark capture party's IP address, as shown in FIG. Finally Baidu ip location query, you can query the IP address corresponding to the exact location.


2.2 Hands: nmap

Use nmap to scan the drone, answer the following questions.

  • 1. drone IP address is active?
  • 2. What drone open TCP and UDP ports?
  • 3. What operating system installed drone? Version?
  • 4. What network services are installed on the drone? Use ifconfig to view the drone IP:

Attack aircraft nmap -sP 127.0.0.1 IP address is active query drone

As shown above, it indicates that drone IP is active. Nmap drone may be used for port scanning: The drone for TCP SYN scan instruction nmap -sS 127.0.0.1. -SU use nmap
127.0.0.1 on UDP port scan. -O -sV use nmap
127.0.0.1 type of operating system and network services to scan:

2.3 Hands: Nessus

Nessus to scan using drones, answer the following questions.

  • 1. What open ports on the drone?
  • What security vulnerabilities of network services on each port 2. drone?
  • 3. How to capture drone environment, in order to obtain system access

  • First, download and install kali inside messus


  • Record what are the admin account password
  • Enter https: // localhost: 8834 / admin page, create a Basic Network Scan
    types Scan, and add the drone IP, save:
  • Scan results: As above, scanning the host ip, scans showed no risk vulnerabilities.

    2.4 practical assignments

    After my name Baidu, I found my blog Park jobs are checked out, although only a job, but exposed a lot of information, I learned through the course, student number of digital choreography, as well as cross-linking between the students information, you can I infer which school, I learned to recognize not serious, my various personality traits.

3. The problems and solutions encountered in the study

4. practice summary

The job made me realize that the confidentiality of the network is difficult to do, it's like a contest between the plague and medicine, is a protracted process, we must do a good job of personal privacy protection.

Reference material

Guess you like

Origin www.cnblogs.com/fungi/p/12514659.html