Lesson 05 - Kali Lab Assignment

docx

School

Palm Beach State College *

*We aren’t endorsed by this school

Course

2022

Subject

Statistics

Date

Feb 20, 2024

Type

docx

Pages

7

Uploaded by CLAUDIAMESA7677

Report
Fle Edit View Go Captwre Analyze Statistics Telephony Wireless Tools Help amze@ RT Q&= s =Eeaarm No. Time Source Destnation 10.000000 192.168.0.2 192.168. 20.002525 192.168.0.1 192.168. 30.002572 192.168.0.2 192.168. 40.004160 192.168.0.2 192.168. 50.150335 192.168.0.1 192.168. 60.150402 192.168.0.2 192.168. 70.150574 192.168.0.2 192.168. 80.151946 192.168.0.1 192.168. 90.153657 192.168.0.1 192.168. 100.153865 192.168.0.2 192.168. 110.154984 192.168.0.1 192.168. PPOOOPOOOOO NP NNRRERNRRNDR protocol TCP TCP TCP TELNET TELNET TCP TELNET TCP TELNET TELNET TCP Length nfo 741550 > 23 [SYN] 7423 » 1550 [SYN, 661550 > 23 [ACK] 93 Telnet Data ... 69 Telnet Data ... 661550 > 23 [ACK] 69 Telnet Data ... 6623 > 1550 [ACK] 91 Telnet Data ... 130 Telnet Data ... 6623 » 1550 [ACK] Seq=0 ACK] Seq=1 Seq=28 Seq=4 Seq=29
login: fake ...... Password:user ...... Last login: Sat Nov 27 20:11:43 on ttyp2 from bam.zing.org Warning: no Kerberos tickets issued. OpenBSD 2.6-beta (OOF) #4: Tue Oct 12 20:42:32 CDT 1999 Welcome to OpenBSD: The proactively secure Unix-like operating system. Please use the sendbug(l) utility to report bugs in the system. Before reporting a bug, please try to reproduce it with the latest version of the code. With bug reports, please try to ensure that enough information to reproduce the problem is enclosed, and if a known fix for it exists, include that as well. $ /sbin/ping www.yahoo.com PING www.yahoo.com (204.71.200.67): 56 data bytes 64 bytes from 204.71.200.67: icmp_seq=0 ttl=241 time=69.885 ms 64 bytes from 204.71.200.67: icmp_seq=1 ttl=241 time=73.591 ms 64 bytes from 204.71.200.67: icmp_seq=2 ttl=241 time=72.302 ms 64 bytes from 204.71.200.67: icmp_seq=3 ttl=241 time=73.493 ms 64 bytes from 204.71.200.67: icmp_seq=4 tt1=241 time=75.068 ms 64 bytes from 204.71.200.67: icmp_seq=5 tt1=241 time=70.239 ms .--- www.yahoo.com ping statistics --- 6 packets transmitted, 6 packets received, 0% packet loss round-trip min/avg/max = 69.885/72.429/75.068 ms $ 1s $ 1s -a 5 .cshre .login .mailrc .profile .rhosts $ exit kaligkali:~$ ip addr 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default gl link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_1ft forever preferred_lft forever
3] VirusTotal Cc o x|+ O & hup virustotal.com/qui/f de4’ 52 DETECTION Aerons (tatic MU Annlab-V3 SecureAge APEX G BiDefender Bav Pro Clomav. (D 52 security vendors flagged this file as malicious cdca7bid3b81dd6dP05IA704{cSSIACH 132108 7cancad9Bb7CO 5245021173274 payioad exe overay peee DETALS BEHAVIOR COMMUNITY @ Suspicious @ Trojen/Win32 Shell 1263 © Win32SwPatch TrojanCryptZ Gen 32 FamVT RorenNHe Trojan WinTrojan Swrort-5710536-0 =%y n o C 7207K8 2021-07-19 15:46:08UTC 2 EXE Ad-Aware @ TrojanCryptz Gen ALvec @ TrojonCryptzGen Avast © Win32:swhatch Avira (no cloud) @ TRPatchedGen2 BitDefenderTheta (@ GenNN.ZexsF 3479 eqi@oyMuBos CAT-QuickHeal ( Comodo Trojan Swrort A TrojWare Win32 Rozena A@
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
c @ 2] 39 DETECTION Ad-Aware SecureAge APEX Avast Avira (no cloud) BitDefenderTheta ClamAV Crowdstrike Falcon Cylance virustotal.com/gui/file; O & https 493307554a641744102873a412208513081c4129103e9976ef35 aedc7eb3d76 (D 39 security vendors flagged this file as malicious 4933075546417441028730412208513081412910369976613 Slaedc7eb3d76 encoded_payload3.exe overiay peexe DETAILS BEHAVIOR COMMUNITY @ TrojanCryptZ Gen ) Malicious @ Win32 atch [Wrm) (@ TRPatched Gen2 (@ AlPackerA69295401F @ WinTrojan Swrort-5710536-0 nfidence_100% (D) @ Winimaicious @ Unsafe 65.00K8 AlYac Arcabit AVG BitDefender CAT-QuickHeal Comodo Cybereason Cynet 2021-07-19 15:58:00 UTC o N @ ~ # 0 EXE @ TrojanCryptZ.Gen @ Trojan CryptZ.Gen @ Win32:Swatch (Wrm] @ Trojan Cryptz.Gen @ TrojenSwrortA @ TrojWare Win32Rozena A@4jwdar Malicious b350c8 @ Malicious (score:
LEWLEL S ERAEERXEAAR 1] Meterpreter_Reverse_TCP [stager] 2] Meterpreter_Reverse_HTTP [stager] 3] Meterpreter_Reverse_HTTPS [stager] 4] Meterpreter_Bind_TCP [stager] 5] Shell Reverse_TCP [stager] 6] Shell Bind_TCP [stager] 7] WinExec se a listed payload or custom? (L/C/H): L EEAAAAAAAAAAAAARAARAIRAARAS reverse_tcp * EEEARARARAR AN
AXXAXXAAXXAARRRRRRARRS Stage * e Info: Shellter will verify that the first instruction of the injected code will be reached successfully. If polymorphic code has been added, then the first instruction refers to that and not to the effective [EVALELN Max waiting time: 10 seconds. warning! If the PE target spawns a child process of itself before reaching the injection point, then the injected code will be executed in that process. In that case Shellter won't [EVEREUICT T ) V=T R (1T T T IR o 5 R -1 You know what you are doing, right? ;o) SN S L HRETS ST 1 Press [Enter] to continue...
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
2 Virustotal o>c e D] erevcamatsansursraderassconaamsconmbarisccirossosssssazsia 27 DETECTION Ad-Aware AL i o coue) Clance Estc o a virustotal.com 27 sacurity vendors flagged this e as maiicious 4700CAISTIBDTS 7S T2 BRSO TTORB 6272 0630653380231 DETALS BEHAVIOR COMMUNITY 39008 e Dstender D 8 R nos 2021-07-19 asIINTC ogrem RemoteAdrin