Lab 5
Enumerating a Network Using SolavWinds Toolset
The SolarWinds Toolset provides the tools yon need ns a network engineer or netn ork consultant to get your job done. Toolset includes best-of-breed solutions that work sit/ply and precisely, providing the diagnostic, peiformance, and bandwidth measurements you want, without extraneous, nnnecessay features.
Lab Scenario
Penetration testing is much more than just running exploits against vulnerable systems like we learned in the previous module. in fact a penetration test begins before penetration testers have even made contact with die victim systems. Rather dian blindly dirowing out exploits and praying diat one of them returns a shell, penetration tester meticulously study the environment for potential weaknesses and their mitigating factors. Bv the time a penetration tester runs an exploit, he or she is nearly certain diat it will be successful. Since failed exploits can in some cases cause a crash or even damage to a victim system, or at die very least make the victim un- exploitable in the future, penetration testers won't get the best results. 111 tins lab we enumerate target system services, accounts, hub ports, TCP/IP network, and routes. You must have sound knowledge of enumeration, which requires an active connection to the macliine being attacked. A hacker enumerates applications and banners in addition to identifying user accounts and shared resources.
Lab Objectives
The objective of tins lab is to help students learn and perform NetBIOS enumeration. NetBIOS enumeration is carried out to detect:
■ Hardware MAC addresses across routers
■ Hidden shared folders and writable ones
■ Internal and external IP addresses
Lab Environment
To earn’ out the lab, you need:
■ SolarWinds-Toolset-V10 located at D:\CEH-Tools\CEHv8 Module 04 Enumeration\SNMP Enumeration Tools\SolarWind’s IP Network Browser
■ You can also download the latest version of SolarWinds Toolset Scanner Irom the link http:/ /www.solarwmds.com/
■ If you decide to download the latest version, then screenshots shown in the lab might differ
■ Run this tool in Windows Server 2012 Host machine and Windows Server 2008 virtual machine
■ Administrative privileges are required to run this tool
■ Follow the wizard-driven installation instructions
Lab Duration
Time: 5 Minutes
Overview of Enumeration
Enumeration involves an active connection so that it can be logged. Typical information diat attackers are looking for includes user account names lor future password guessing attacks.
Lab Task
1. Configure SNMP services and select Start ־־>Control Panel ־.>Administrative Tools ־־> Services.
![]() |
FIGURE 5.1: Setting SNMP Services |
3. Click die Security tab, and click Add... The SNMP Services Configuration window appears. Select READ ONLY from Community rights and Public in Community Name, and click Add.
![]() |
FIGURE 5.2: Configuring SNMP Services |
![]() |
FIGURE 5.3: setting SNMP Services |
6. Launch the Start menu by hovering the mouse cursor on the lower-left corner of the desktop.
![]() |
FIGURE 5.4: Windows Server 2012—Desktop view |
7. Click the Workspace Studio app to open the SolarWinds Workspace
Studio window.
![]() |
FIGURE 5.5: Windows Server 2012—Apps |
6. ־nie main window of SolarWinds Workspace Studio is shown in the following figure.
![]() |
FIGURE 5.6 Solarwinds workspace studio main window |
![]() |
FIGURE 5.7: Menu Escalation for IP network browser |
![]() |
FIGURE 5.8: IP Network Browser windows |
10. Now click the Plus (+) sign before die IP address.
![]() |
FIGURE 5.9: IP Network Browser windows results page |
11. It will list all die information ot die targeted IP address
![]() |
FIGURE 5.10: IP Network Browser windows results page |
Lab Analysis
Analyze and document die results related to die lab exercise.
Questions
1. Analyze the details of die system such as user accounts, system MSI, hub ports, etc.
2. Find the IP address and Mac address of the system.
Không có nhận xét nào:
Đăng nhận xét