Hacking of Computer Networks. Dr. Hidaia Mahmood Alassouli

Читать онлайн.
Название Hacking of Computer Networks
Автор произведения Dr. Hidaia Mahmood Alassouli
Жанр Математика
Серия
Издательство Математика
Год выпуска 0
isbn 9783969443545



Скачать книгу

without showing the offline hosts, remove –v.

      # nmap –A –oA report 192.168.1.0/24 –p-

       Use the program Dradis. Go backrack, reporting tools, evidence management, dradis. It works https. Go to the browser and write https//127.0.0.1:3004. Write the username admin and the password admin.

Image

      In dradis, click on import from file> Choose the xml file and make upload. You will get all destinations in the subnetwork.

       Scan by metasploit armtage

Image

       Go to backtrack, exploitation tools, network exploitation tools, metasploit framework, armitage

Image

       We can use Cobalt Strike tool. You must buy the tool as it is not free

Image

      iii. Vulnerability Scanning

Image

       There are many programs for vulnerability scanning: Nessus, acunetix, w3af, armitage, netsparker, cobalt strike.

       Nmap scripting engines.

Image

       You can check using nmap on the version detection and operating system detection, traceroute. You can scan your host using a script in your computer

Image

       Nessus scan

Image

       In backtrack write

       # apt-get install nessus

       Go to Nessus in /opt/nessus

       # cd /opt/Nessus

       # cd sbin the add user with the command Nessus-adduser

Image

      To register in Nessus

      # cd /opt/Nessus/bin

Image

      After you finish, go to applications, backtrack, vulnerability assessment, vulnerability scanners, nessus

      In browser write htps:// 127.0.0.1:8834

      add the network subnet to scan

       Use the Acunetix web vulnerability scanner

Image

       W3af Web Vulnerability scanner

Image

      Go to Vulnerability Assessment, Web Application Assessment, Web Vulnerability Scanner, w3af gui

       Scan vulnerability using armitage and metasploit

Image

      f) Understanding Proxy Servers:

Image

      You can use TOR proxy server

Image

      g) Understanding anonymizers:

Image

      a) Download and install hide my ip

      b) There is another program psiphon to access certain websites when the website block my isp

      h) Understanding HTTP tunneling technique

Image

       Use the tool super network tunnel. Install it in the server and client and make the configuration. It is used when there is firewall the blocks all ports to server except the the http ports 80 and 443 ports and we want to communicate with the server through the open port 80 but we must install the server part of program also in the server

Image

       Add user. Then start server.

Image

       Setup the program in client computer. Give it the ip of the server. Put the user name that you created in the server and the password. You can add internet explorer over tunnel and logon through ftp tunnel

Image

      Конец ознакомительного фрагмента.

      Текст предоставлен ООО «ЛитРес».

      Прочитайте эту книгу целиком, купив полную легальную версию на ЛитРес.

      Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или Связной, через PayPal, WebMoney, Яндекс.Деньги, QIWI Кошелек, бонусными картами или другим удобным Вам способом.

/9j/4AAQSkZJRgABAQEBLAEsAAD/4gIoSUNDX1BST0ZJTEUAAQEAAAIYAAAAAAIQAABtbnRyUkdC IFhZWiAAAAAAAAAAAAAAAABhY3NwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQAA9tYAAQAA AADTLQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAlk ZXNjAAAA8AAAAHRyWFlaAAABZAAAABRnWFlaAAABeAAAABRiWFlaAAABjAAAABRyVFJDAAABoAAA AChnVFJDAAABoAAAAChiVFJDAAABoAAAACh3dHB0AAAByAAAABRjcHJ0AAAB3AAAADxtbHVjAAAA AAAAAAEAAAAMZW5V