2 macchine virtuali - Altervistaerror0.altervista.org/university/nmap/demo_nmap.pdf ·...

13
2 macchine virtuali

Transcript of 2 macchine virtuali - Altervistaerror0.altervista.org/university/nmap/demo_nmap.pdf ·...

Page 1: 2 macchine virtuali - Altervistaerror0.altervista.org/university/nmap/demo_nmap.pdf · 2010-02-04 · Applications places System Host VM Tabs a 800 MHz ware Valerio mar gen 15, 17:57

2 macchine virtuali

Page 2: 2 macchine virtuali - Altervistaerror0.altervista.org/university/nmap/demo_nmap.pdf · 2010-02-04 · Applications places System Host VM Tabs a 800 MHz ware Valerio mar gen 15, 17:57

IP e netmask

Page 3: 2 macchine virtuali - Altervistaerror0.altervista.org/university/nmap/demo_nmap.pdf · 2010-02-04 · Applications places System Host VM Tabs a 800 MHz ware Valerio mar gen 15, 17:57

Host discovery: Ping scan

Page 4: 2 macchine virtuali - Altervistaerror0.altervista.org/university/nmap/demo_nmap.pdf · 2010-02-04 · Applications places System Host VM Tabs a 800 MHz ware Valerio mar gen 15, 17:57

L’interfaccia di rete relativa alle macchine virtuali

Page 5: 2 macchine virtuali - Altervistaerror0.altervista.org/university/nmap/demo_nmap.pdf · 2010-02-04 · Applications places System Host VM Tabs a 800 MHz ware Valerio mar gen 15, 17:57

Impostiamo wireshark

sull’interfaccia vmnet8

Page 6: 2 macchine virtuali - Altervistaerror0.altervista.org/university/nmap/demo_nmap.pdf · 2010-02-04 · Applications places System Host VM Tabs a 800 MHz ware Valerio mar gen 15, 17:57

Eseguiamo l’idlescan:Notare l’opzione –P0 per evitare il ping

iniziale

Page 7: 2 macchine virtuali - Altervistaerror0.altervista.org/university/nmap/demo_nmap.pdf · 2010-02-04 · Applications places System Host VM Tabs a 800 MHz ware Valerio mar gen 15, 17:57

Stage1: dialogo tra attaccker e zombie

IPID rilevato dello zombie

Page 8: 2 macchine virtuali - Altervistaerror0.altervista.org/university/nmap/demo_nmap.pdf · 2010-02-04 · Applications places System Host VM Tabs a 800 MHz ware Valerio mar gen 15, 17:57

Scansione porta 134 (quella chiusa)

Stage 2: attackerspoofa l’IP dello 

zombie  (.128) e invia il SYN

Page 9: 2 macchine virtuali - Altervistaerror0.altervista.org/university/nmap/demo_nmap.pdf · 2010-02-04 · Applications places System Host VM Tabs a 800 MHz ware Valerio mar gen 15, 17:57

IPID finale dello zombie dopo l’attacco: incremento 

di 1 ‐> porta closed

Stage3: nuovamente dialogo con lo 

zombie

Page 10: 2 macchine virtuali - Altervistaerror0.altervista.org/university/nmap/demo_nmap.pdf · 2010-02-04 · Applications places System Host VM Tabs a 800 MHz ware Valerio mar gen 15, 17:57

Stage1: dialogo tra attaccker e zombie

IPID rilevato dello zombie

Page 11: 2 macchine virtuali - Altervistaerror0.altervista.org/university/nmap/demo_nmap.pdf · 2010-02-04 · Applications places System Host VM Tabs a 800 MHz ware Valerio mar gen 15, 17:57

Stage 2: attackerspoofa l’IP dello 

zombie  (.128) e invia il SYN …

Scansione porta 135 (quella aperta)

Page 12: 2 macchine virtuali - Altervistaerror0.altervista.org/university/nmap/demo_nmap.pdf · 2010-02-04 · Applications places System Host VM Tabs a 800 MHz ware Valerio mar gen 15, 17:57

Stage2: …notarecome il pacchetto di RST incrementi l’IPID 

dello zombie

Page 13: 2 macchine virtuali - Altervistaerror0.altervista.org/university/nmap/demo_nmap.pdf · 2010-02-04 · Applications places System Host VM Tabs a 800 MHz ware Valerio mar gen 15, 17:57

Stage3: nuovamente dialogo con lo 

zombie

IPID finale dello zombie dopo l’attacco: incremento 

di 2 ‐> porta open