Use the following configuration in this lab : Virtualbox Kali linux (or any Linux distribution) - > minimum RAM = 500MB windows XP where Wireshark is installed → minimum RAM = 500 MB Step 1 : Initial configuration This configuration can be done using internal network connection in the virtualbox and a manual assignment of IP addresses. Be sure that
Use the following configuration in this lab :
- Virtualbox
- Kali linux (or any Linux distribution) - > minimum RAM = 500MB
- windows XP where Wireshark is installed → minimum RAM = 500 MB
Step 1 : Initial configuration
This configuration can be done using internal network connection in the virtualbox and a manual assignment of IP addresses. Be sure that both machines belong to the same internal network (having the same net prefix and the same network mask)
Kali Linux : 100.17.0.10 \ 8
Windows : 100.17.0.20 \ 8
use the ping command to test the connection from both sides. Show the result of each ping command using a screenshot :
….........................................................
Step2: open Wireshark in the Windows machine and set a filter “tcp”. Use hping3 command in Kali Linux to send two packets to the windows machine like the following :
- packet nature : tcp
- number of packets : 2
- destination port : 23
- Flag SYN active
- interval time 100 microseconds
write the command here and give a screenshot from Kali and Wireshark capture of those two packets
….......................................................................................................................................
from wireshark can you tell what correspond to tcp destination port = 23 ?
…........................................................................................................................
Step 3 : set Wireshark filter now to “udp” to see only udp packets
Send two packets to the windows machine like the following :
- packet nature : udp
- number of packets : 4
- destination port : 69
- interval time 100 microseconds
write the command here and give a screenshot from Kali and Wireshark capture of those packets
….........................................................................
from wireshark can you tell what correspond to udp destination port = 69 ? and what its hexadecimal representation
…........................................................................................................................
Step4 :
use hping3 to send 5 tcp packets to the windows machine with :
- the flag RST active
- a fixed source port (not randomized)
- destination port randomised (not a fixed one)
write the command here and give a screenshot from Kali and Wireshark capture of those packets
….......................................................................................................................................
from wireshark can you tell what was the source port chosen by hping3 when he sent those packets ? Give its name , decimal representation and hexadecimal representation. Use a screenshot to show me how did you figure it out
…........................................................................................................................
Step5: use the scripting capability of hping3 to send one IP packet to windows XP.
write the command here and give a screenshot from Kali and Wireshark capture of this packet
….......................................................................................................................................
Step6: like step5 exactly but this time the source address should be a spoofed address not the real address of Kali Linux (the forged address should be 30.30.30.30)
write the command here and give a screenshot from Kali and Wireshark capture of this packet
….......................................................................................................................................
Step7 : clear all filters (if you have set filters) and export the capture file in a txt format and upload it with this file in the blackboard. Name it by your name.
Step 8 : use nmap to scan the Windows machine from the Kali Linux machine.
Write down the command that you have used and take screenshot result from Kali. Comment the result of the nmap scan.
…................................................................................................................................
Step 9 : what nmap command to use to figure out the active machine in the internal network of the virtual box in use ? Write the command and Give a screenshot and tell how many machines you find active (comment your results)
….......................................................................................................................................
…......................................................................................................................................
…......................................................................................................................................
Step 10: what nmap to be used if you want to test if http service is open on the Windows machine ? Write down the command that you have used and take screenshot result from Kali. Comment the result of the nmap scan.
….......................................................................................................................................
Step by step
Solved in 2 steps with 2 images