CEH v12 - Module08 OCR
CEH v12 - Module08 OCR
Ethical Hacker
LEARNING OBJECTIVES
Ethical Hacker
Packet sniffing is the process of monitoring and 4 Asniffer turns the NIC of a system to the
capturing all data packets passing through a given promiscuous mode so that it listens to all the data
network using a software application or hardware transmitted on its segment
device
Attacker PC
4 It allows an attacker to observe and access the running NIC Card in
Promiscuous Mode
entire network traffic from a given point
Attacker
forcesA a
switchto behave- a
1 Packet sniffing allows an attacker to gather
sensitive information such as Telnet passwords,
email traffic, syslog traffic, router configuration,
web traffic, DNS traffic, FTPpasswords, chat
sessions, and account information
network users:
= Shared Ethernet
frame’s destination MAC address with their own and discard the unmatched frame.
limitation to bombard switches with fake MAC addresses until the switches can no
Attacker PC
Promiscuous Mode
A
switch to behave
as a hub
hh
Note: Passive sniffing provides significant stealth advantages over active sniffing Copyright
© by Natgeet eee tolegels
male gees
eeimal eeeslice
network.
= DHCP attacks
Ethical Hocker
An attacker connects his desktop/laptop to a switch port He/she runs discovery tools to learn about network topology
MiTM
The traffic destined for the victim’s machine is redirected to The hacker extracts passwords and sensitive data from
the attacker the redirected traffic
Switch.
tools.
attack.
&
Ethical Hocker
SMTP
: . Passwor n ta ar nt in
NNTP
.) Passwords and data are sent .) Passwords and data are sent
POP FTP
in clear text in clear text
HTTP
credentials.
SNMP
= SMTP
= NNTP
= POP
= FTP
= IMAP
Ethical Hocker
Session = Session
£
= Protocols/Ports
Transport eeeS SSS OSS eee aay eae Transport
IP Addresses
Network sn a eam eS SS a Heeme ane ane Network
Initial Compromise
Datalink @=="---"- ee ee oo Data Link
; Physical Links ;
Physical SnPoP ewer ES eea ee Ee ee Copyright
7.© _All
Rights
Physical
Reserved.
Reproduction
isStrictly
Prohibited.
Application Stream
Application
PP ee BD ©22 eeePOPS,
eee eeIMI,
IMAP, eeeSSL,eee
SSH pS
aren
oo Application
PP
Initial Compromise
Physical Links
Figure 8.10: Sniffing in the data link layer of the OSI model
Ethical Hocker
in the network
® PTW60(https://www.globalspec.com)
network.
Via
Pe
a aXgig
1000
TPI4000 Series
Protocol Analyzer
SPAN Port
internet
Ethical Hocker
Attackers connect a listening device (hardware, software, or a combination of both) to the circuit carrying
information between two phones or hosts on the Internet
a It allows an attacker to monitor, intercept, access, and record information contained in a data flowina
communication system
Note: Wiretapping without a warrant or the consent of the concerned person is aCopyright
criminal
© byoffense _All
in most
Rights
Reserved.
countries
Reproduction
isStrictly
Prohibited.
Ethical Hocker
4 Lawful interception refers to legally intercepting data communication between two end points for surveillance on
the traditional telecommunications, Voice over Internet Protocol (VoIP), data, and multiservice networks
Service
Court order/request for wiretap
PRR TTT TTT TTT TPCT T TTL TCT TPT TTT TTT PCDATA TCT TCT T TTT TCTPP TTT TCTTTP PRTC TTT TTP
Provider
#
*.
,*
* *
*.
Service
Provider
SEER SS a CCS CRON TERRE C TERRE TEETER TT TTT eee eee
System .
: Lawenforcement Router
= agenciescan access
» intercepted data
= whenever
required V
Ethical
Hocker
“Each switch has a fixed-size dynamic Content Addressable Memory (CAM) table
J The CAM table stores information such as MAC addresses available on physical ports with their associated
virtual LAN (VLAN) parameters
0: Globally unique
1: Locally administered
3 Bytes 3 Bytes
1: Multicast
CAM Table
MAC Add
a as:23:df:45:45:t6
5 er:23:23:er:t5:e3
Port 1 Joe ’
the ARP
CAM Table
A 1 a
es teeeeeneees lamMACB «0555.
a eSa aee
ea
: : MAC A Ais on port 1
A 1
7 Traffic A eREReEeceeeeen
C 3 MAC A
CAMTable Copyright
© by _AllRightsReserved.
Reproduction
isStrictlyProhibited.
ee SS.araran
Port 1 Jo Tey,
wn ai
CAM Table
machine is connected.
MAC| PORT
A 1
B 2
Cc 3
CAM Table
A 1
: Traffic A
2
: MAC A
CAM Table
Ethical Hocker
4 Once the CAM table fills up on a switch, additional ARP request traffic floods every port on the switch
4 This
like aattack
hub will also fill the CAM tables of adjacent switches
Traffic A ******-> B
Ethical Hocker
MAC
eee
eda elesoa ea
se
, macof -i ethO -n 10 - Parrot Terminal
Ethical Hocker
Layer 2 Switch
J The Switch Port Stealing sniffing technique uses MAC flooding to sniffthe packets r 7
4 The attacker floods the switch with forged gratuitous ARP packets with the target MAC
address as the source and his/her own MAC address as the destination
J Arace condition of the attacker’s flooded packets and the target host’s packets occurs;
thus the switch must change its MAC address, binding constantly between two different
ports
J Insuch acase, if the attacker is fast enough, he/she will able to direct the packets
intended for the target host toward his/her switch port
4 The attackernow managestosteal the target host’s switch port and sendsARPrequests
to the stolen switch port to discover the target host's IP address
J When the attacker gets an ARP reply, this indicates that the target host’s switch port
binding has been restored, and the attacker can now sniffthe packetssent toward the Copyright
© by ---- _All
Logical
Rights
Connection
Reserved.
Reproduction
isStrictlyProhibited.
targeted host ‘=""" RealConnection
MAC Table
Host B bb-cc-dd-ee-—
Edi
gO0a 10.0.0.2 Port B
a ry my ot
(ED)
132,000
addresses is reached
00:0c:1c:cc:cc:cc
00:0a:4b:dd:dd:dd
a
ee
132,000
Bogus MACs
rm a |
9. end
or
Ethical Hocker
User A4 A r 4 DHCP
Server
de ee re
= 3 ff wy Sim a a
“S 8 >: 8 a5 %& DHCPScope
oe =: PP, r 7
eitas
tsa i ecsscrseoseennes
iecnmncttloanl
10.10.10.1 |
3 4K403 dhcpStarvation.py (Attps://github.com)
Information.
MAC addresses.
DHCPDISCOVER
(IPv4)
/ Send My DHCP
SOLICIT (IPv6) (Broadcast) Configuration Information
DHCP-relay agent
DHCPREQUEST
(IPv4)
/REQUEST(IPv6) (Broadcast)
__. DHCP Server
DHCPACK(IPv4) / Reply (IPv6) (Unicast)
Here Is Your Configuration Seee eeecece eeeee eee eeeee eee eeeeeee eee .
: *" IP Address: 10.0.0.20
‘ = SubnetMask:255.255.255.0
See e eee , Default Routers: 10.0.0.1
, DNS Servers: 192.168.168.2, 192.168.168.3
, Lease Time: 2 days
N/A Reconfigure .
information
A series of DHCP messages is used in communication between DHCP servers and DHCP clients.
Transaction ID (XID)
=
ih
Filename—128 bytes
DHCP Options
a server
10.10.10.2
Attacker 10.10.10.254
=» Yersinia
ft5
yersinia [00:09:41]
—
Q.
Q,
QO.
a.
OF
S .255 MessageType
DISCOVER Iface
=amale LastAprseen
00:09:4
.295 DISCOVER ethO 11 Apr 00:09:
.255 DISCOVER ethO 11 Apr 00:09:¢
.255 DISCOVER etnO 11 Apr 00:09:¢
.255 DISCOVER ethO 11 Apr 00:09:¢
.255 DISCOVER ethO 11 Apr 00:09:¢
.255 DISCOVER ethO 11 Apr 00:09:¢
.255 DISCOVER Sag
al0) Apr 00:09:.
.255 DISCOVER Saal
0) Apr 00:09:4
.255 DISCOVER Sam
ale Apr 00:09:4
Ethical Hocker
DHCP Server
interface.
DHCP Server
User Gane
nenceccceneneenseenecnesenenseseaseseseseneaeanns
By running a rough DHCP server, an attacker
IP Address: 10.0.0.20 can send incorrect TCP/IP setting
Subnet Mask: 255.255.255.0
DHCP Snooping
Attacker
Cele
a eeay _All RightsReserved.Reproductionis Strictly Prohibited.
4 set interface ge-0/0/1 mac-limit 3 action 4 Enable DHCPfiltering for the switch:
EEOR config
4 set interface ge-0/0/2 mac-limit 3 action <IP address> dhcp filter
drop
exit
4 show
exit
interface 3 -0/0/1.0 { J) Enable DHCPfiltering for an interface:
mac-limit 3 action drop;
config
} interface 0/11
} exit
removed.
2 minutes.
DHCP Snooping
Enabled
5. end
to the switch.
show
Switcn:
exit
exit
exit
exit
host machine should know the MAC address of the destination machine. The OS also maintains
ARP_REQUEST
Hello, | need the MAC address of 10.10.10.3
ARP REQUEST
Hello, |need the MAC address of 10.10.10.3
IP 1D: 10.10.10.2
MAC: 00-14-20-01-23-46
IP ID: 194.54.67.10 .
Connection Established
HostName IP MAC
A 194.54.67.10 00:1b:48:64:42:e4
B 192.54.67.15 O0-14-20-01-23-47
Ee Command Prompt — O x
c:\Users\Admin}arp -a
Physical
62-15-Sd-24-2d-8f
Address
Yes, | am here
This is 10.1.1.1 and my
MAC address is Al-B1-
C1-D1-E1-F1
10.1.1.0 21-56-88-99-55-66
| want to connect to 10.1.1.1 11-22-33-44-55-66
10.1.1.1, but | need
a MAC address A A
Switch broadcasts °
v @ecanas> @asssss> v A
Ethical Hocker
4 Using fake ARP messages, an attacker can divert all communications between two machines, resulting in all
traffic being exchanged via the attacker’s PC
4
- + Cele
gna)! me
MA)
-4g
ecm
too
810-18)
gels
(0
odes
eine
imadeel
alis
ia-lep
communications between two machines so that all traffic redirects via the attacker’s PC.
switch in a network.
Ettercap
https://www.ettercap-project.org
dsniff
https://www. monkey.org
https://linux. die.net
aa we https://github.com
Habu is a hacking toolkit
that provides various
commands to perform ARP
poisoning, sniffing, DHCP —
=— _—ihttps://sourceforge.net
Starvation, etc.
https://github.com
Copyright © by _All Rights Reserved.Reproduction is Strictly Prohibited.
=" Habu
attacks:
sh ip dhep snooping
Implement
binding
Dynamic ARP Inspection Using DHCP Snooping Binding Table
Saying 10.10.10.2
a Gece
ceceeceseeesseeenssesens“ ARP 10.10.10.1
Prerrrrreiiir
tir itr > i
< inion cease
is MACC
Ethical Hocker
DHCP snooping is
trust/rate
configured
is on
configured
the following
on the
Ethical
L3
following
Hacking
Interfaces:
10and Countermeasures
Interfaces:Copyright© by E@-Council
DHCP snooping
ttn
DHCP snooping
Interface
Or
10 0 0 0 0
10 0 0 0
Assume that an attacker with the source IP address 192.168.10.1 connects to VLAN 10 on
arp inspection
Switch (config)# show ip arp inspection
Source Mac Validation: Disabled
10 Enabled Active
10 30 ° > 0
Vlan DHCP Permits ACL Permits Probe Permits Source MAC Failures
10 30 0 0 0
Ethical Hocker
dF
New Open Save
| Back
oe. >| 2 8 F © & & Ss -
Summary
| Diagnosis
|Endpoints
| Protocols
|Conversations
|Matrix’PacketsLogs
|GraphsReports | P
OO;S0:FC 45” ;
00;11:09:46 ni ir ih
| ort a:er:6e-7D:99\Packets:
|1,182
O0:11:58:47 ‘ Absolute
TimeSource |=
O00;
00:88:46 807 09:08:59.233956 00-13-8F-6... Oois 21.36.238.17 Tell 21.36.23
OO Lilie o is 21.36.239.27 Tell 21.36.73.
00;02:45:4£ is Z1.36.238,37 Tell 21.36.23.
O02; 45:40
O0-04;E6:40
6
o
is
is
Z21.36.238.47
Z1.36:238.57
Tell
Tell
21.36.23.
21.36.23...
ARP AntiSpoofer
O0:04 EB 40 https://sourceforge.net
00:11: 56)56
OO: 7344S?
is 1-96: 29(\67
is 21.36,238°77 Felt,
Tell 21.9629...
21.36.23...
o is 21.36.238.8? Tell 21.36.23...
OO;12:79:58
o is Z1.36.238,97 Tell 21.36.23.
00:11;85:62
is 21.36.238.107 Tell 21.36.2...
00:11:56:62
o is Z1.36.238.117 Tell 21.36.2...
00;11;56:64
00:
13:3F168
00:11:09:6E
| [= ARPStraw
OO0S12 https://github.com
64
60
Packetfilters: = — 2006-05-25 09:08:59. 234073
Errorpackets: = rE e pose]
Packetscanhurect : estination 55 FEF:
FF: FF: FF: FF: FF
Packetslost: ; =e 3 OO:135:8F 6B: 7D: 39
GxOS06
Packets
acceptet
[NEES|| , - shARP
Packets
rejected off
Buffer usaqe: } 483 KB
OO00| FF FF FF FF FF FF 00 13 @F 62 7D 353 O8 G6 OO O01 08 OO sii arai I| Daa
Fe https://github.com
OOl2Z
' 06 O4 00 G1 00 13 GF 6E 7D 95 15 24 EE BO 00 00 00 OO ¢ LL... ee eas ~
Module 08 source.
Page 1269 Ethical Hacking and Countermeasures Copyright © by E@-Gouncil
al
ay 00;11;09:46
Hal O00:11:5B:47
Packets rejected: a
. ooo0| FF FF FF FF FF FF 00 13 8F 6B 7D 99 08 06 00 01 08 OO |........ MFccececerscevs
Ethical Hocker
1 A MAC duplicating attack is launched by sniffing a network for MAC addresses of clients who are actively associated with a
switch port and re-using one of those addresses
4 By listening to the traffic on the network, a malicious user can intercept and use a legitimate user's MAC address to receive
all the traffic destined for the user
. This attackallows an attacker to gain access to the network and take over someone's identity on the network
internet
Attacker
Internet
Certified
| Ethical Hocker
Network
Click
click
In theon
Under Start
Ethernet
the
the
Ethernet
and
and
“Property”
Advanced
Internet
search
Properties
and then
for
section,
tab
> Control
Networking
window,
clickbrowse
onPanel
Properties
click
and
for
and
onNetwork
Sharing
the
open
inConfigure
the
it,Center
Address
then
Ethernet
navigate
button
andStatus
click
and
to window
on
then
it
Property: Value:
ForwardingOptimization © oo0A959D6816
Hyper-VNetwork Adapter Name
IPSec Offload
lPv4 Checksum Offload to
Type
Onassign
Note:
the
“ipconfig/all”
Enter
right
andthe
side,
click
MAC
under
OK
oraddress
“net
“Value,”
config
number
type
rdr”in
without
inthe
the new
command
a “:”
MACbetween
address
promptto
the
you
number
verify
wouldthe
pairs
like
Jumbo Packet
Large Send Offload Version 2 (IPv:
Large Send OffloadVersion2 (Pv!
Max Number of RSSProcessors
Maximum
Number
ofRSSQueues
aximum RSS Processor Numbe
a “|
ho work Address
Network Direct (ROMA)
Packet Direct
Receive Butter Size
Ss
changes
(change
If the changes
MAC address
are visible
in the
thenregistry)
reboot the system, otherwise try method 2
Cele
a eeay Nat geet eeetole)
gels male gees
eeimal eee sliceR
Cele
ig na ee) aAgeeAeee] 8gee male pees
as mae esa elias:
Advanced tab.
‘iu
Note: Enter the MAC address number without “:” in between.
Cance
| '
File Edi iew Favorites Help
Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001
» ™)(4d36e967-€325-11ce-bfcl-08002be10318}
ies Type Data
> ) [4d36e968-€325-11ce-bfc1-08002be10318} aii REG
SZ ;
, ™)(4d36e969-e325-1
1ce-bfcl-08002be10318}din REG
SZ
» ™) [4d36e96a-e325-11ce-bfc1-08002be10318}=e acne
», ™)
™D{4d36e96b-e325-11ce-bfc1-08002be10318}
{4d36e96c-€325-11ce-bfcl-08002be10318} =~ =
J RssBaserrocNu..REG_AC o
»i {4d36096d-0325-11ce-bfc1-08002be10318}_,
||~~sMaxProcNu...
REG
SZ os
»") (4d36e96e-e325-11ce-bfcl-08002be10318}
28)
*RSSProfile REG_S2 4
»0 {4d36e96F-2325-1
1ce-bfc1-08002be
10318} abi"TCPChecksum...
REG_SZ 3
» )) (4d36e970-e325-11ce-bfc1-08002be10318}ab)"TePChecksum...REG_SZ 3
» )) {4d36e971-e325-11ce-bfc1-08002be10318}a6)*UDPChecksum...REG_SZ 3
wv
™))(4d36e972-e325-11ce-bfcl-08002be10318}
ab)"UDPChecksum...
REG_SZ 3
> = 0000 a> Bus
Type REG
SZ Ox0
OOOT ne}CharacteristicsREG_DWORD 0x00000004
(4)
ab Componentid REG
SZ VMBUS\f8615163-df3e-46c5-91
3f-f2d2f965ed0e}
ab)DevicelnstancelD REGSZ VMBUS\{f8615163-df3e-46c5-91
3f-f2d2f965ed0e}\V...
ab DriverDate REG_SZ 6-21-2006
ne DriverDateData REG_BINARY 0080Bea3<594<601
| ab)DriverVersionREG
SZ 10.0.22000.434
ab)ForwardingOpti... REG_SZ 0
ne IffypePreStart REG_DW(
; DeConfiguration ab)InfPath REG
SZ Value
name:
7Sa Properties ab |nfSection REG
SZ NetworkAddress
Module 08 Page 1275
, MP(4d360974-€325-11ce-bFcl-08002be10318}
|“2!MatchingDeviceld
REG_SZ
>I) (4d36e975-e325-11ce-bfcl-08002be
10318} ab/NetCfginstanceld
REG_SZ
> )) (4d36e977-2325-11ce-bfcl-08002be10318} weNetLuidindex REG_DWé Cancel
>MD{4d36e978-e325-11ce-bfc1-08002be10318}
|
»™)(4d36e979-e325-11ce-bfcl-08002be10318}
R's]
Networkinterfac...
REG_QWORDOx1d81357738060df
(132877455328305375)
») {[4d36e97b-e325-11ce-bfc1-08002be10318}4b |ProviderName REGSZ Microsoft
») (4d36e97d-e325-11ce-bfc1-08002be10318}ab)ReceiveBufferSizeREGSZ 8192
» ™) (4d36e97e-e325-11ce-bfcl-08002be10318} ab|SendBufferSize REG
SZ 1024
tna aon
eeren
eeesnneenameammessab)VlanID REG
SZ Ethical
0 Hacking
All Rights
and Countermeasures
Reserved. Reproduction
Copyright
is Strictly
© by Prohibited.
EG-Council
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Sniffing
Ethical Hocker
TechnitiumMACAddressChangerv6 - by Shreyas
Zare = ms
|_Network
Connections Changed
| MAC
Address https://www.novirusthanks.org
) i) Ethernet(KemelDebugger] No 00-00-00-00-00-00 Down,NonOperational 0 bps
|fv] Ethernet No 00-15-5D-01-80-00 Up,Operational 0bps
https://technitium.com
——-_—_- ——
— yA
Connection Ethernet
Device MicrosoftHyper-VNetworkAdapter
Hardware ID VMBUS‘{f8615163-dfSe-46c5-91
3f-fad2f965edD:
Config ID {549683588-F693-4023-6
9B6-DCC294DB111
4}
EiChangeMACAddress
|
i?
iY Automatically
Make
Use '02'
newasMAC
first
restart
octet
address
network
of MAC
persistent
connection
address to applychanges -
Why?
Sent 6.32 MB (8719829bytes}
Ethical Hocker
J ICMP Router Discovery Protocol (IRDP) is a routing protocol that allows a host to discover the IP addresses of active
routers on their subnet by listening to router advertisement and soliciting messages on their network
J The attacker sends a spoofed IRDP router advertisement message to the host on the subnet, causing it to change its
default router to whatever the attacker chooses
4 This attack allows the attacker to sniff the traffic and collect valuable information from the packets
J Attackers can use IRDPspoofing to launch man-in-the-middle, denial-of-service, and passive sniffing attacks
Attacker Router
Attacker
advertisement. AttackerRouter
Routing Table
Ethical Hocker
J VLAN hopping is a technique used to target network resources present on a virtual LAN
J It can be performed by using two primary methods: Switch Spoofing and Double Tagging
J Attackers perform VLAN hopping attacks to steal sensitive information such as passwords, modify, corrupt or delete data,
install malicious codes or programs, and spread viruses, Trojans, and worms throughout the network
[ eee Legitimate
. Switch 1 —————————
==& & Switch 2
ie
,VLAN20
-
VLAN 1
ri
@ +
. *
= te
- 2
es .
Ethical Hocker
Attackers connect a rogue switch into the network to change the operations of the STPprotocol and sniff all the
network traffic
4 Attackers configure the rogue switch such that its priority is less than that of any other switch in the network, which
makes it the root bridge, thus allowing the attackers to sniff all the traffic flowing in the network
pal Priority
=32769 server
Root ae nee
Bridge
Rogue Switch = | :
Prioritty=O"SS
SB iicbhnisiiaiuciabedathbeisiansncintedsasnieiliel
= "pcabicennennaaasipnemmae
.
- Traffic flow Switch 2 Traffic flow
: =Attackersniffsall Priority
=32769
: ; thenetworktraffic
iy
Traffic flow
Seeee >
. a ee ee
Coeae ee Server
sh ip dhepUse
snooping
DHCPbinding
Snooping Binding Table, Dynamic ARP Inspection, and IP Source Guard
; 10.10.10.1
2a:33:4c:2£;4a:l1le
10.10.10.9 185235 E MACA
MACC
Received Traffic Source
IP 10.10.10.2 Mac B
attacks:
untrusted interfaces.
= 10.10.10.1
2a:33:4c:2f;d4da:le 10.10.10.9 185235 FastEthernet3/18
snooping MAC A
A , eee
Givvnnnccnnnssencesnsnecceeess
: - 2
: _
10.10.10.5 Mac B
eerersReese , 3
IP 10.10.10.2 Mac B
4 Explicitly configure the ports as accessports 4 Ensure that each accessport is assigned with
and ensure that all access ports are | VLAN except the default VLAN (VLAN 1):
| Gs
configured not to negotiate trunks:
Switchport access vlan 2
“Ensure that all trunk ports are configured | switchport trunk native vlan 999
not to negotiate trunks: —
4 Ensure that the native VLANs on all trunk
Switch (config-if)# switchport mode 6-9 ports are explicitly tagged:
trunk
Ethical Hocker
unidirectional links and further disable the affected interfaces in the network. These
) DNS poisoning is a technique that tricks a DNS server 4 It allows the attacker to replace IP address entries
into believingthat it has received authentic information for a target site on a given DNSserver with the IP
when it has not received any address of the server he/she controls
4 It results in the substitution of a false IP address at the J The attacker can create fake DNS entries for the
DNS level where the web addresses are converted into server (containing malicious content) with names
numeric IP addresses similar to that of the target server
Proxy Server
DNS Poisoning
Ethical Hocker
4 In this technique, the attacker’s system must be connected to the local area network (LAN) and be able to sniff
packets
J It works well against switches with ARP Poison Routing
What is the
IP address of Router
www.xsecurity.com mi
wwenace
eeteecerecsess
au [
ro ih?, a
IP:200.0.0.45 "
John A
Attacker sniffs the =
(IP:10.0.0.3)= routerandredirects
DNS
requests to his machine credential
and‘
WWW.XSecurity .<cCom
is located at
10.0.0.5
Attacker runs
arpspoof/dnsspoof Fake Website
server.
What is the
IP address of Router
www.xsecurity.com? IP1000254 Real Website
www.xsecurity.com ua
IP: 200.0.0.45 ua
John
. Attacker poisons the
(IP: 10.0.0.3): requests
to hismachine
router and redirects DNS redirects
Attacker
to
credential
real
the
sniffs
website
request
and
the .°-=
www.xsecurity.com
is located at
10.0.0.5
Attacker runs
ol Hocker
4 Internet DNSSpoofing, the attacker infects John’s machine with a Trojan and changes his DNS IP address
to that of the attacker's
Whatis the
IP address of
WWw.xsecurity.com?
John’s Browser
Attackersniffsthe credential Mi
and redirects the request to
John Fake Website real website z
Real Website
* DNS
Request
: to 200.0.0.2
(IP: 200.0.0.2)
changing his DNS IP address to 200.0.0.2
What is the
IP address of
www.xsecurity.com?
John’s Browser
connects to 65.0.0.2
iii pci CERNCRNNET:> u
Attacker sniffs the credential oi
and redirects the request to
: | websit
- = DNS
Request ey,
s » to 200.0.0.2
: Attackerruns DNSServer
AttackerinfectsJohn’scomputer by (IP: 200.0.0.2)
changing his DNS IP address to 200.0.0.2
Ethical Hocker
J The attacker sends a Trojan to John’s machine that changes his proxy server settings in Internet Explorer to
that of the attacker’s and redirects to the fake website
What is the
IPaddress
of &« RealWebsite
www.xsecurity.com? ino = www.xsecurity.com m2
Si Shad
(IP: 200.0.0.45) LV
Lilsae(Pe peter same?cme! foe acielresgeesPat vteet wel Ihe (oldoeing ener
<a Lee see oto[| tp sepa enire
a
=
a
John A . ee ee ee Attacker’sfakewebsitesniffs °
. the credential and redirects the =
(IP:10.0.0.5)
= 2 ‘
=AllofJohn’s
Web
. requests go through
« Attacker’s
machine
Coescusncnesceesenesnsesecssceacs Attacker
sends
John's
Attacker infects John’s request to the Fake website
website.
is:
z=
.
.
: Allof John’s
Web
. requests go through
: Attacker’s
‘=
machine
SER ERE REPRER REE ERR SERRE RERERREE RRR RRR EEE
Ethical Hocker
J DNS cache poisoning refers to altering or adding forged DNS records into the DNS resolver cache so that a DNS
query is redirected to a malicious site
If the DNS resolver cannot validate that the DNS responses have been received from an authoritative source, it
will cache the incorrect entries locally, and serve them to users who make a similar request
Whatis the
IP address of
www. xsecurity.com?
A DNS
server for
: xsecutity.com
server.
: SendDNSresponse
= with IP of a fake
. https://github.com
https://www.ettercap-project.org
https://github.com
[exampledomainl.
[exampledomainl.
[examplLedomainl.
Tee erp ea
[exampledomainl.
eel epe a
Implement a Domain Name System Security Extension Restrict the DNS recusing service, full or partial, to
(DNSSEC) authorized users
Resolve all DNS queries to a local DNS server Secure internal machines
Block DNS requests to external servers Use a static ARP and IP tables
Configure a firewall to restrict external DNS lookup Use Secure Shell (SSH) encryption
Implement an intrusion detection system (IDS) and Do not allow outgoing traffic to use UDP port 53 asa
deploy it correctly default source port
how
attacks.
= Ensure that the “Hosts” file resolution is disabled on both the clients and servers.
Ethical Hacker
Certified
| EthicalHocker
r | - 7
i Capturing
fromEthernet
2 _ a x
4 Itlets you capture and File Edit View Go Capture Analyze Statistics Telephony Wireless Jools Help
age Rei*e2xeFaSBeaan
interactively browse the (Wy
[ack
Stop.capturing
packets
| 3 -)+
Mo. Time Source Destinaton Protocol Length Info a
trafficrunningona 2257 467.547554 10.10.2.11 18.18.1.19 TCP 55 [TCP Keep-Alive] 61002 + 8@[ACK] Seqg=2933 Ack=146760Win=2626...
2258467 .547573 18.10.1.19 18.16.1.11 TCP 66 [TCP Keep-Alive ACK] 86 + 61002 [ACK] Seq=146760Ack=2934 Win-..
computer network 2259467 .573628 16..16.1.14 224.8.8.251 MDS 418 Standard query response @x@800@TXT, cache flush PTR_adb.tcp...
2268 467.573686 febe: 6fO9: fb32:b56.. Tfe2::fb MDS 438 Standard query response @x6000TXT, cache flush PTR_adb.tcp...
2261 467.5735713 Fesbe::15:5dtf:fel3:.. Tf2::Tb MONS 371 Standard query response @x8O0@TXT, cache flush PTR adb. tcp...
2262 467.656969 18.28.1121 16.18.1.19 TCP 55 [TCP Keep-Alive] 61603 = 86 PACK]Seq=4455Ack#270044Wine2613...
4 WiresharkusesWinpcap
to 22763
467.657002
2264 468,.359528
18.18.1.19
Fede: :1:1
18.18.1.11
TT82: 216
TCP
ICMPye
66 [TCP Keep-Alive ACK] 68 + 61003 PACK]Seqg=278044
90 Multicast Listener Report Message v2
Ack=4456Win-..
@ Capturing
fromEthernet
2 — Oo x
File Edit View Go Capture Analyze Statistics Telephony Wireless Jools Help
(E2o Re GCessetshhbaaan
Ethical Hocker
VIEWS
TATE
S32FwEPOULLTESMDc
SMjQrOTdkZHS10cn
RPBBRE
sUZtSMA2
PWgLPg
TSudagech Beethro
DAT: isr\n Mid VIEWSTATEGENERATOR=C7EE9ABBA
EVENTVALIDATIONS@2F
wEGAAR
JUDOrbpOnjNNA th) eM tr
TidatSpegibcndGscPod KASoe Ze QoeLoPacUnnsgPpHrng3] l6ulMcyuLy
Connection: keep-alive\r\n
TINTSIBLOJORgLR
IDETx binlogin=LogLlndTTP/1.1 382 Found
Referer: Http://www.
m@ovlescope.com/\r\n Cache-Controi: priva
Upgrade-Insecure-Requests: i\r\n Content-Type: text/htel; charseteutt-8
rin
LOCATION: /1InGex.a5pe
(Full request URL:trame:
est in nttip: // Www.MOVLESscope
.com sorwer: Microsoft-LiIS/ig.@
fRITP request 4/16) K-ASpHOt-Vorsion: 4.9. 30319
Prev request in frame 1185] set-Cookle: micopes] jwtydNfiwroz; path=/
esponse in frame: ieir K-Powered-By: ASP.NET
= HTML
ile
doagx-www-form-urlencoded
Form URLEncoded: applications
La: bytes
Date: Wed, 18 May 2022 12:50:53 GAT
Content-Length: i268
| © # Thewindow
sizevaluefromtheTCP
= “/wEdAARJUUbOrbpOxj]
header
(tcp.window
» Form item: "_ EVENTVALIDATION" size
NNN]
value),
xtMLURWM
2 bytes
TtrRuli Ga
Packets:
3D8g1DcnOGGcPO02LANGaxReGvMQ]
1793- Displayed:
69(3.8%)
2F
- Dropped
3fJAwSKugaxAa3gXTzRfq070LdP 16 chent pkts. 24 server pitts. J] tens
in a TCP Stream
a data stream.
File Edit View Go Capture Analyze Statistics Telephony Wireless Tools Help
1 *| 7
Host: wWww.moviescope.com\r\n “
User-Agent: Mozilla/S.@ (Windows NT 10.0; rv:78.0) Gecko/20100161 Firefox/78.0\r\n
Accept: text/html, application/xhtm1+xm1, application/xm1; q=6.9, image/webp, */*;q=6.8\r\n
Accept-Language:en-US, en;q=0.5\r\n
Accept-Encoding: gzip, deflate\r\n
Content-Type: appLication/x-www-form-ur Lencoded\r\n
» Content-Length: 324\r\n
Origin: http://www.moviescope.com\r\n
ONT: i\r\n
Connection: keep-alive\r\n
Referer: http: //www.moviescope.com/\r\n
Upgrade-Insecure-Requests: 1\r\n
\r\n
est URI: Nttp://www.moviescope.com/
HTTP request 4/16
Prev request in frame: 1185
KE SpDONSe in :
Form item: “_
VIEWSTATE” = “/wEPDwULLTE3MDc5MjQz0TdkZH5
16cnJ+BtsUZtSM/W1LgLFq
T5uNag6G+46A4b26/sM1"
Form item: "_VIEWSTATEGENERATOR™= "C2EE9ABB"
Form item: "_EVENTVALIDATION"”
= "/wEdAARJUUubDSrbpOxjNNN]
xtMLIRWMttrRuli9aESDBgi
Dcn0GGcPO002LAX9axReGveQ]
2F3T
S3AwSKugaKAa3gx7zRTqQ070LGP_.
Form item: “txtusername" = "sam"
Form item: "txtpwd" = "Test"
Form item: “btnlogin™ = "Login"
a ee eee M.0.n.
Giscien Bowens
TEND.B”.POST
/ HTTP/1.1
Host: www.moviescope.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.@) Gecko/20100101 Firefox/78.0
Accept: text/ntm1, application/xntmleml, application/xn1;q-0.9, image/webdp,*/*;q-0.8
Accept-Language: en-US,
en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-waw-form-ur lencoded
Content-Length: 324
Origin: Nttp://www.movlescope.com
DNT: 1
Connection: keep-alive
Referer: Nttp: //ww.foviescope
.com/
Upgrade-Insecure-Requests: 1
119aE3D8g91Dcn0GG6c 7ZRTQO7OLOPacUNnsgPpHrne3)
l6urMcyULV
YINCK2BIOIOBQUASDEt
x tnlogin=LoginHTTP/1.1 382 Found
Cache-Control: priva
Content-Type: text/html; charset=utf-8
Location: /index.aspx
Server: Microsoft-1IS/1¢.@
X-AspNet-Version: 4.90.30319
Set-Cookie: mscope=1jwydNfSwro=; path=/
X-Powered-By: ASP.NET
Date: Wed, 18 May 2022 12:50:53 GMT
Content-Length: 128
Display
Protocol
Monitoring @ tcp.port==23
Addresses
IP Address
Filters
@ ip.src==205.153.63.30 or ip.dst==205.153.63.30
= Other Filters
frame.number < 30
Ethical Hocker
ip.srce==192.168.0.0/16 and
tcp.analysis. Retransmission ip.dst==192.168.0.0/16
7 Displays only traffic in the LAN (192.168.x.x), between
Displays all retransmissions in the trace
workstations and servers — no Internet
ip. '=
tcp contains traffic ip.srce XXX.XXX. : XXX. XKX && ip.dst
ip.ds !=
i ee nee
ese en Filter by a protocol
(e.g. SIP
)andfilter out unwantedIPs
interest
Internet
Ethical Hocker
Riverbed Packet Analyzer Plus performs the real- Capsa, a portable network performance analysis and
Riverbed Packet Capsa Portable
time network packet analysis and reporting of large Network Analyzer diagnostics tool, provides packet capture and analysis
Analyzer Plus trace files capabilities with an easy-to-use interface
ro| oe (a techlentral
PacketAnalyser
Plus - @x a io eo Ca] Analysis
Propect
1- Colasoft
Capsa13Enterprise
Thal — a x
(OME
| TIME
CONTI f fi o Anghsis
|= System TeeleViews
t . — = A ; +S ———i7 Vi
et =ha —_
ae F = ; © close
AiTacs : 5 7 - oF ae “a oT =
di Trace
File ote: earch = = reat Copy Adapter Stari Sop Analysis ConversationLog
« CgGetting
Started
7 Qe,
Detach Chart Object
aS«al Filter Views
cies
Tite
Filet Poaerri
ci
be Senere View Chart
Selection Capture Anakysis
Settings Utilization
(05) ios
a Tati
Chartibps)
Packet
Buffer
120.0
hae
Devices
{ rit ei uate ba i : Heteork
Usepe
byPort
Nore / beat =|
* fbLocal
Stem 5piores
©bey
Microso®
Corporation : A
ges
cnactelatitdhatinsdhdasian
tol \c#Capture
- Default Detau ‘|Port.||PProcess
Application
|SIP
|H323
| Noaid
&
byPort W @ DHProtocolExplorer
(1) <=
=NDMAC
Explorer
(3 ence st incdlvennish
Die
tee ==.
Fs]myIPExplorer
(3)
ma VolPExplorer a 16DKE
= Ee,Process
Explorer
(3) 7 80KE
4 ©) Applicatson
Explorer
(4) 3 60KB LiveDemo
peaaba +0 EG |
ooBarchaidth
Usage Lj CreateTrafficUtizationChart
@ Genenc (3) [Ent)Start a Wireless Capture
omLANaadNetaork 5 | Morein Knowledgebace_
|
oe Multi.Segenent
Arahart4! orucget
aLbP! | ¥
See Current
Selection:
214529
- 214360
(11.5)
@1see
- Total
Window:
214329
-214349
- Drop
After:
1Day ‘ < 2
Network
Usage
byPort
Name
onvifgl
at9:43
PM-Selected
Chart
Total
Throughput BR SyCapture-Defautt
MEtnemet<hBandwidth-1000Mbps
| finactive
OO0I02
482 GOReady fAameptrer
GO Go @o
https://www. riverbed.com https://www.colasoft.com
Cele
a eeay Nat geet eeetole)
gels male gees
eeimal eee sliceR
‘
OmniPeek |2-~ RITA \ (Real Intelligence
.
sind
sented
pondelcomet
tees oc ees Threat Analytics)
OmniPeeksniffer =o ~.DB B22)oF = https://www.activecountermeasures.com
Packets recerwed: 1,655
displaysaGoogle ieee
inetets
77 Enter
fiter expresson
herekeeFlforhelp — i
ac Flow
1| Fags Relatve
Tie
|Protce ObserverAnalyzer
y 4 Compass 2 i feae@::15:50rf:fe...Gall MLOv2-capabl @.446251
ICMPvé
MLDv2
LR ICMP
yt
window showin g nee
Eyer
3 i fee::a5.sdFe:fe...
4 “4Fee:215:
ig monsve
5dtf ee orsg BONS
VE
1
I
17a
375
9.454933
ONS
8.734556
ONS
siti
Bonjo.
1 2 4 TEBELSS ite. ss “ All ALOWV2-capabl,.. a4 1,533484 ICHPv6MLOw2
ICMP
Yt LR
the locations of all) w= at Sees i aa)
= Expert ? i Febo::15:5dffi fe... ¢ All MLDw2-capabl... 34 1.536619ICHPvG
ALDw2LR ICMP
yi
the public IP .Servers *
a w:: eee ee
All MLDv2-capabl... lls ae
1.536626ICMPv6
MLOv2
LA ICMP
yt .
Flows 9Ci16,18,1.14 %Lok? ed 1.536620
IGMP IGRP PRTGNetwork Monitor
addresses of Applications10MPe@2:15:50:13:8C:a5MP Ethernet
Broadcast 5a 1.542428
AAPRequest https://www.paessler.com
Wee 11 fe80:215:5dFF:
fe... BALLMLDv2-capabl.., a 1.760449
ICMPv6
MLOv2
LA ICMP
yi
Captu red pa ckets roblegy
Pages
12 Wfete::6f09:fb32:...
13 y 18,18.1.14
WY monsvs
iy eONS
2
3
208
188
2.034008
DNS
2.934908
ONS
Bonjor
Bordon
saerecbaile 14 WY
fe80::15:5dFF
fe... yfeDNSWS 1 178 2.034118
DNS Bonjot
Voice
&Video 15 i 18.18.1.14 iy ene a4 2.185062IGMP TGMP
Calls —' : - =- —_-—
= -— —
ee
oe= - - —_
=- | rWinds
i D Pack
7 1468 85C724 O06
7811 FF FE8066 66O82
88 *..$.x........ * *
Graphs @Status: exPAeAeAeD 426882efBGebBeBGGeBGBFBeFE ae eeee
eeee =
Statistics
Summary so :
PacketLength: ‘
178 5688
78 14@2
£988
G8 7898
80 De
1661 08G8
64 G2O@
2D200002
756E G9BE
6964 ...%. 6.06.5,
65 .....adb-unide https://www.solarwinds.com
Nocles @ Timestamp: B23:
23.S65297588eb/ lis 2622 B4 6E 74 69 66 69 65 64
04 SF 61 64 62 04 SF ntified._eadb._
sieaks & YFEthernetType2 987463 78056C6F63/616C88G8FF
G881 tcp.local.....
Application i} Destination: 33:33:00:00:00:FR
IPvémcast:e@:€
| 112OF41GE64726F6964Ch27 68FFG661 .Android.'....
M®
Source: @2:15:50:13:8C:A5 126C@
6C68210061 08G66875 8608 86OO...1.....K....
ne @Protocol
Type: @x6600
Internet
Protecol
versio 14@88681518
63FE
15468 75@@
Ce80:
3286CO
3288it #281eGGe..... Lids
680¢ 8880 BFG815 wx.cee
scree
ae .
a Sits aa eh
Wireshark.
scket
Analyzer
Plus - @ xX
i)
Devices «<
¥ FF LocalSystem Filters (None) s
¥ gyMicrosoft
Corporation yt Total Throughput=
fe) Bandwidth Over Time 94
Views
Wi mors
Pd Network UsageAnalysis (1 5Ook MeiPvé-icep
ne]Protoco!
Distribution
” ° o¢6
thee!
Traffic Analysis (1s
- 1c =OK
o Bardwidth Usage
wmGenenc
ss LAN and Network
> @ Multi-Segment Analysis (MSs
© Performance
andErrors —— ee 29
Notes
——_on = a ne ee
z Ba EEE
Notes
———_———_—_
O_O MMN@{?"+]--_
_—————
&|
TS a
AnalysisProject
1 - ColasoftCapsa13Enterprise
Trial = Co om
|
Default
| Packets
| Domain
|TCP
|Port| IP
| Process
|Application
|SIP| H.323
| Nosi4|
a) MACExplorer (3) ~* Total
Traffic
byBytes ar
Sa IPExplorer
(5) CHUCK NPr
er VoIPExplorer
& BE Process
Explorer
(3)
& @ Application
Explorer
(4) LiveDemo
QFindTopTalkers
inNetwork
Q WhoIsUsing
Network
Bandwidth?
dow toDetectARPAttacks
Qrow toDetect
Network
Loop
Gow toMonitor
IMMessage
[ More Videos...
|
How-To's
Sd
How to Use Capsa
< >
e
:- File
Omnipeek
Edit View Capture
Lele) eeigs) eo)
i“7 v ilEnter
afilterexpression
Capture1
here
(use
ma
iF1
—xfor
Buffer
. cil
—
Filter
."help)
a-*xy
= usage:
state:
—e
For
a=|0%
a
=<=
SE
= | eH
e
|Accept
——
a =SS
all
=Pa
=packets
Packets filtered: 1,665 fatal
Dashboards bn | hin
me
eS
16
a |
Ors Fae
a
OmtROre,
ie.
0.294144
i,
connection to a mobile. This app works on rooted Android devices. The Wi-Fi connection
bponury
€ 01-20 22:47:30
Gmail 01-2022:47:38
173.194.117.128:443 TCP
nrt04s09-in-10.1e100_net Sol
edge-star-shv-01-nrt1 facebook.com SL
Ethical Hacker
Ethical Hocker
Turn off network identification broadcasts, and if possible, restrict the network to authorized users
to protect the network from being discovered with sniffing tools
Use encrypted sessions, such as SSHinstead of Telnet, Secure Copy (SCP)instead of FTP,and SSLfor
email connections, to protect wireless network users against sniffing attacks
Copyright© by Nat geet eee tole)
gels male gees
eeimal eee sliceR
Ethical Hocker
Use HTTPS instead of HTTP to protect usernames Alwaysencrypt wirelesstraffic with a strong
and passwords encryption protocol such as WPA2 and WPA3
Use a switch instead of a hub as a switch delivers Retrieve the MACdirectly from the NICinstead of
data to the intendedrecipient only the OS;this prevents MACaddressspoofing
Use Secure File Transfer Protocol (SFTP),instead Usetools to determineif any NICsare runningin
of FTPfor the secure transferof files the promiscuous mode
installed.
IPv6.
WPAS3.
addresses in a network.
4 You need to check which 4 Run IDS and see if the MAC J Run network tools such as
machines are running in the address of any of the machines Capsa Portable Network
promiscuous mode has changed (Example:router’s Analyzer to monitorthe
- MAC address) network for detecting strange
Promiscuous mode allowsa
and read each network ) IDS can alert the administrator © Enables you to collect,
packet that arrives in its about suspicious activities consolidate, centralize, and
entirety analyze traffic data across
different network resources and
technologies
Ethical Hocker
Reverse
Ping Message =
COCR
PURO
RRE == ‘ > 5 (> >
Non- : a
Promiscuous =. IPID:194.54.67.10—: a Se ee
Mode Admin neNespOCa Suspect
Machine MAC:00:1b:48:64:42:e4
= : MAC:
00-14-20-01-23-46 Bsnenrel
10.0.0.4, 10.0.0.1,
IP ID: 192.168.168.1
, ‘ : MAC: 00-14-20-01-23-45
4 Amachine in the promiscuous
mode responds to the ping
Non-Broadcast ARP
message as it has the correct
information about the host
network.
Response Received
36-2E-3G-45-S6-K2 11-22-33-44-55-66
Ping Message
No Response
36-2E-3G-45-S6-K2 11-22-33-44-55-66
= DNS Method
IP ID: 192.168.168.1
MAC: 00-14-20-01-23-45
Reverse
Sreseeeneeeeeenesennnenees
.> ecucepennecueneraus
>
IP ID: 192.168.168.3
MAC: 00-14-20-01-23-47
= ARP Method
running.
Non-Broadcast ARP
ARP Request
IP ID: 192.168.168.1
MAC: 00-14-20-01-23-45
Non-Broadcast ARP
Ping Reply
IP ID: 194.54.67.10 IP ID: 192.168.168.2
MAC: 00:1b:48:64:42:e4 MAC: 00-14-20-01-23-46
Non-Broadcast ARP
ARP Request
IP ID: 192.168.168.3
MAC: 00-14-20-01-23-47
| = Zenmap os o a demo
- NetScan
Took® ProDemo
VeronBuild
§-19-2020
based
onversion
11.91 = o a
scgn Jools Profile Help i
Tanger:
| 10,701.19 =| Profile +| Scant Canc BN i rea| ta
Welca... isc Rene
boBuyHow! Manual
Toots
- Promiscucus
ModeScanner
9
Figen, ;
HostsSenaices
Aimap
Qutpul
Ports
/Hots
Tapoliegy
Heart
Ceetaile
‘Scan ; si posiSeasnein OB
eb
osdeast
ii batGB
Mudeast
Address
0 Bocas
Bet
Aderess Aid
Mote
OS4Host nmap
scopesodter-detect
10.101,
19 = Deets Coe nlPree GB
Scadcact
16
bet GB
Muncact
Adcress
| rea =he ToAuineated
2 pew.
movesrepe:
Starting
Weed
aoe( Wttpa://neep.
org i et 2022-04-12
Mri PacificBaylight
Time ard EB
srcacicast
&bet GBMutcast
Address
3 satel Repu ts
seeyer eng
bag ne
1s up (a. = letenc (10.10.1.19) StaiteScanning
ond
Analyses
Complete ———
Botshown:
: S83 closed
£ tcp ports (reset
| hetevork
Eaterfae
T STATE SERWICE
ten cen tte Ether (00,00.f.11)- MacraeaPt
Hyer-WMletevoth,
achat
1 ip ooen serpc Ne —E —EEEEES — —————————————————————————————
f
Deytcp open netbios- san IP Address MACAddress iF Manofacturer Hostname £41 Sié BS GRE HO Mi Mi Analysis
Maton ope https
443/%cp
opentts MELO.1G.1.9
[Oz-15-so-ze-7e-05] iillof [x[x|Promtacacns
S26 /tip ope ldaps LG,10.L.13 &2-15-8-28-T4-64 7 z x 6 Ez & Haybe
Shifice ope ftps ela : la ena a fa \ ; ; Se
9i/icp ope imaps - LO.L0,L.14
= Od=[5=80-2 ! rt i Z E x *(. Kk
5 Bayes
eye
S55/tce open ponds 16,1 i2-15-85-24-72-81 WeeBoviescope com ff E 2 Zz x #£Matvhe
IML tcp open mag L9.10.1-22 9 1 z Mi ct Corporation SERVERIO22 x XK x % X% Maybe
rida ltep ope ienhy
ree /te =
Fl
Gi. milk
ap
festa: “LU00111")
Pack
Extern.. https://www.netscantools.com
Filter
Hosts https://nmap.org Cele
ia nee ay . All RightsReserved.
Reproductionis StrictlyProhibited.
addresses]
> Zenmap — Cp x
Scan Tools Profile Help
Command:
Filter Hosts
= NetScanTools Pro
>
: File
demoEdit
- NetScanTools®
Accessibility
ProView
DemoI[Pv6
Version
Help
Build 5-19-2020basedon version11.91 =— Oo x
ah
Use
thistooltofind GBroadeast
31bit GBMulticastAddressO
©Group
BitAddress AddNote
network adapters listening
Mm
promiscuous
mode. GBBroadcast
16bit © Multicast
Address
1 ta@ umpToAutomated
Scanning
andAnalysis
Complete |_|Addto Favorites
Do Scan NetworkInterface
aa Ethernet (10. 10. 1.11) - Microsoft Hyper-V Network Adapter
StartIP Address IP Address MAC Address I/F Manufacturer Hostname B31 Ble Be GRP MO Ml MS Analysis
SL
Ethical Hocker
> Sniffing concepts along with protocols vulnerable to sniffing and various hardware
protocol analyzers
> Various sniffing techniques such as MAC attacks, DHCPattacks, ARP poisoning,
spoofing attacks, DNS poisoning, etc. along with their countermeasures
» Various sniffing tools
LJ In the next module, we will discuss in detail how attackers, as well as ethical hackers
and pen-testers, perform social engineering to steal critical information related to the
target organization