Powered by Blogger.
Home » » Module 07: Network Penetration Testing Methodology-Perimeter Devices 1

Module 07: Network Penetration Testing Methodology-Perimeter Devices 1

Written By AKADEMY on Wednesday, July 3, 2019 | 11:21 AM

Exercise 1: Identifying and Bypassing a Firewall

Scenario

Attackers are constantly searching for vulnerable clients to penetrate their network through IP spoofing to damage or steal data. The attackers can access packets through a firewall by spoofing the IP address. If attackers are able to capture network traffic, as explained in the previous lab, they can perform Trojan attacks, registry attacks, password hijacking attacks, etc., which can be disastrous for an organization’s network.
Therefore, as a network administrator you should be able to identify attacks by extracting information from captured traffic such as source and destination IP addresses, protocol type, header length, source and destination ports, etc. and compare these details with modeled attack signatures to detect if an attack has occurred.
Lab Duration15 Minutes
  1. Click Web Server Subnet C click Ctrl+Alt+Delete.
    Screenshot
  2. In th password field click Pa$$w0rd and click Login button or press Enter.
    Screenshot
  3. Server Manager window appears, click closebutton.
    Screenshot
  4. Navigate to Start menu and click Control Panel. Click Windows Firewall link in Control Panel.
    When Windows Firewall control panel appears, click Turn Windows Firewall on or off in Windows Firewall in the left pane.
    Screenshot
  5. Now, to customize the settings of windows firewall, choose Turn on Windows Firewall radio button in both network location settings and click OK.
    Screenshot
  6. Now, Windows Firewall is ON in Web Server Subnet C machine.
    Screenshot
  7. Click Kali Linux (External Network).
    If Kali Linux lock screen appears, click on the screen and press Enter. If it does not appear, skip to the next task.
    Screenshot
  8. Type root in the Username field and click Next.
    Screenshot
  9. Type toor in the Password field and click Sign In.
    Screenshot
  10. Click Terminal icon from the taskbar to launch.
    Screenshot
  11. Now check the connectivity between the Attacker Machine (Kali Linux (External Network)) and the Victim Machine (Web Server Subnet C).
    To check, type ping 172.19.19.11 in the terminal and press Enter.
    If the ping is successful, meaning the remote machine is replying with 64 bytes of memory, then press Ctrl+C to stop pinging the machine.
    Ping command is not enough to bypass the travel packets between two machines.
    Screenshot
  12. Now perform traceroute to the victim's machine, now launch another command terminal window and type traceroute 172.19.19.11 and press Enter.
    After performing traceroute, it will not no results will be displayed any result as Windows Firewallis turned on as shown in the screenshot below:
    Press Ctrl+C on the keyboard to stop the traceroute command.
    Traceroute command will track the packet travelling between two machines.
    Screenshot
  13. Now, type following command nmap --script=firewalk --traceroute 172.19.19.11 and press Enter.
    This command will check for the open ports on the target machine, as shown in the screenshot below.
    This displays open ports on the victim's machine, filtered ports under Host script results, and Traceroute details.
    Screenshot
  14. Now, type hping3 -S 172.19.19.11 -c 100 -p ++1 and press Enter.
    Hping begins to ping each port in incremental order till port 100 and displays the response packets for the ports that respond to the requests.
    In hping statistic, you can see out of 100 packets only 2 packets are transmitted to victim’s machine and the rest 98 packets’ transfer fails.
    The 2 packets which passed through the firewall from port 21 and 80 and other packets are filtered by the firewall.
    You can use these two open ports to perform your penetration testing.
    The scan takes about 5 minutes to finish.
    -S switch is for setting SYN TCP flag.
    Screenshot
  15. Close all the windows.
In this lab you have learned how to Identify and Bypassing firewall.
Share this article :

0 comments:

Post a Comment

 
Trung Tâm Đào Tạo An Toàn Thông Tin Học Hacker Mũ Xám Online | Học An Ninh Mạng Trực Tuyến | CEH VIỆT NAM
Copyright © 2013. HACKER MŨ XÁM - All Rights Reserved
Web Master @ Võ Sĩ Máy Tính
Contact @ Đông Dương ICT