Hping3: Unterschied zwischen den Versionen

Aus Xinux Wiki
Zur Navigation springen Zur Suche springen
 
(29 dazwischenliegende Versionen desselben Benutzers werden nicht angezeigt)
Zeile 1: Zeile 1:
=Install=
+
*[[Was ist Hping3]]
*apt-get install hping3
+
*[[Hping3 anwenden]]
=PING auf port 0=
+
*[[DOS mit hping3]]
*hping3 192.168.244.52
+
*[[ICMP-Timestamp-Anfrage mit hping]]
 
 
=SYN Ping=
 
*hping3 192.168.244.52 -S -p 80 -w 2000 -d 1500 --fast
 
SYN tcp flag: -S
 
Port 80: -p 80
 
TCP Window: -w 2000
 
Data Size: -d 1500
 
10Packets/s: --fast
 
 
 
=SYN PUSH Ping=
 
*hping3 192.168.244.52 -S -P -p 80
 
Push Flag: -P
 
 
 
=ACK Ping=
 
*hping3 192.168.244.52 -A -p 80
 
ACK Flag: -A
 
=Scan=
 
*hping3  -8 1-1000  -S bortus.tuxmen.de
 
<pre>
 
Scanning bortus.tuxmen.de (94.130.248.217), port 1-1000
 
1000 ports to scan, use -V to see all the replies
 
+----+-----------+---------+---+-----+-----+-----+
 
|port| serv name |  flags  |ttl| id  | win | len |
 
+----+-----------+---------+---+-----+-----+-----+
 
  21 ftp        : .S..A...  64    0 29200    44
 
  22 ssh        : .S..A...  64    0 29200    44
 
  80 http      : .S..A...  64    0 29200    44
 
  139 netbios-ssn: .S..A...  64    0 29200    44
 
  389 ldap      : .S..A...  64    0 29200    44
 
  443 https      : .S..A...  64    0 29200    44
 
  445 microsoft-d: .S..A...  64    0 29200    44
 
  636 ldaps      : .S..A...  64    0 29200    44
 
All replies received. Done.
 
Not responding ports:
 
</pre>
 
 
 
=gespoofte IP=
 
*hping3 192.168.244.52 -S -p 80 -a 192.168.244.156
 
=SYN flooding=
 
*hping3 -S 192.168.244.52 -a 192.168.244.10 -p 631 --flood
 
 
 
=Pakete in Verbindung schicken=
 
kann man in Verbindung mit ARP Spoofing benutzen
 
;Versuchsaufbau
 
*server: tac
 
*client: cardassia
 
==fenster server==
 
;starten eines tcp server auf port 2020
 
root@tac:~# nc -lp 2020
 
==fenster client eins==
 
;tcpdump
 
cardassia ~ # tcpdump -ni lan  -S port 2020
 
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
 
listening on lan, link-type EN10MB (Ethernet), capture size 65535 bytes
 
==fenster client zwei==
 
;client
 
thomas.will@cardassia ~ $ nc 192.168.244.52  2020
 
==fenster client eins==
 
cardassia ~ # tcpdump -ni lan  -S port 2020
 
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
 
listening on lan, link-type EN10MB (Ethernet), capture size 65535 bytes
 
15:26:44.663526 IP 192.168.244.1.58257 > 192.168.244.52.2020: Flags [S], seq 1758983238, win 29200, options [mss 1460,sackOK,TS val 2268763 ecr 0,nop,wscale 7], length 0
 
15:26:44.663980 IP 192.168.244.52.2020 > 192.168.244.1.58257: Flags [S.], seq 963043879, ack 1758983239, win 28960, options [mss 1460,sackOK,TS val 193210349 ecr 2268763,nop,wscale 7], length 0
 
15:26:44.664035 IP 192.168.244.1.58257 > 192.168.244.52.2020: Flags [.], ack 963043880, win 229, options [nop,nop,TS val 2268763 ecr 193210349], length 0
 
==fenster client drei==
 
datei erstellen 10 bytes mit Umbruch
 
cardassia ~ # echo "hallo tux" > data.dat
 
cardassia ~ # hping3 -s 58257  -p 2020 -A -d 10 -E data.dat  -c 1 -M 1758983239 -L 963043880 192.168.244.52
 
 
 
=Links=
 
*http://www.eggdrop.ch/texts/hping/#2_1
 
*http://www.rationallyparanoid.com/articles/hping.html
 
*http://0daysecurity.com/articles/hping3_examples.html
 
*http://maintain-under-the-radar.org/index.php/security/terminologie/scannen-von-netzwerken
 

Aktuelle Version vom 25. Juli 2024, 06:53 Uhr