Thứ Hai, 28 tháng 4, 2014

Enumeration p6

Lab 5

Enumerating a Network Using SolavWinds Toolset

The SolarWinds Toolset provides the tools yon need ns a network engineer or netn ork consultant to get your job done. Toolset includes best-of-breed solutions that work sit/ply and precisely, providing the diagnostic, peiformance, and bandwidth measurements you want, without extraneous, nnnecessay features.

Lab Scenario

Penetration testing is much more than just running exploits against vulnerable systems like we learned in the previous module. in fact a penetration test begins before penetration testers have even made contact with die victim systems. Rather dian blindly dirowing out exploits and praying diat one of them returns a shell, penetration tester meticulously study the environment for potential weaknesses and their mitigating factors. Bv the time a penetration tester runs an exploit, he or she is nearly certain diat it will be successful. Since failed exploits can in some cases cause a crash or even damage to a victim system, or at die very least make the victim un- exploitable in the future, penetration testers won't get the best results. 111 tins lab we enumerate target system services, accounts, hub ports, TCP/IP network, and routes. You must have sound knowledge of enumeration, which requires an active connection to the macliine being attacked. A hacker enumerates applications and banners in addition to identifying user accounts and shared resources.

Lab Objectives

The objective of tins lab is to help students learn and perform NetBIOS enumeration. NetBIOS enumeration is carried out to detect:
■ Hardware MAC addresses across routers
■ Hidden shared folders and writable ones
■ Internal and external IP addresses

Lab Environment

To earn’ out the lab, you need:

■ SolarWinds-Toolset-V10 located at D:\CEH-Tools\CEHv8 Module 04 Enumeration\SNMP Enumeration Tools\SolarWind’s IP Network Browser
■ You can also download the latest version of SolarWinds Toolset Scanner Irom the link http:/ /www.solarwmds.com/
■ If you decide to download the latest version, then screenshots shown in the lab might differ
■ Run this tool in Windows Server 2012 Host machine and Windows Server 2008 virtual machine
■ Administrative privileges are required to run this tool
■ Follow the wizard-driven installation instructions

Lab Duration

Time: 5 Minutes

Overview of Enumeration

Enumeration involves an active connection so that it can be logged. Typical information diat attackers are looking for includes user account names lor future password guessing attacks.

Lab Task

1. Configure SNMP services and select Start ־־>Control Panel ־.>Administrative Tools ־־> Services.

FIGURE 5.1: Setting SNMP Services
2. Double-click SNMP service.
3. Click die Security tab, and click Add... The SNMP Services Configuration window appears. Select READ ONLY from Community rights and Public in  Community Name, and click Add.
FIGURE 5.2: Configuring SNMP Services
4. Select Accept SNMP packets from any host, and click OK.

FIGURE 5.3: setting SNMP Services
5. Install SolarWinds-Toolset-V10, located in D:\CEH-Tools\CEHv8 Module 04 Enumeration\SNMP Enumeration Tools\SolarWind’s IP Network Browser.
6. Launch the Start menu by hovering the mouse cursor on the lower-left corner of the desktop.

FIGURE 5.4: Windows Server 2012—Desktop view

7. Click the Workspace Studio app to open the SolarWinds Workspace
Studio window.

FIGURE 5.5: Windows Server 2012—Apps

6. ־nie main window of SolarWinds Workspace Studio is shown in the following figure.

FIGURE 5.6 Solarwinds workspace studio main window
7. Click External Tools, and then select Classic tools -> Network Discovery -> IP Network Browser.

FIGURE 5.7: Menu Escalation for IP network browser
8. IP Network Browser will be shown. Enter die Windows 8 Virtual Machine IP address (10.0.0.7) and click Scan Device ( the IP address will be different in  your network).

FIGURE 5.8: IP Network Browser windows
9. It will show die result in a line widi die IP address and name ot die computer diat is being scanned.
10. Now click the Plus (+) sign before die IP address.

FIGURE 5.9: IP Network Browser windows results page

11. It will list all die information ot die targeted IP address
FIGURE 5.10: IP Network Browser windows results page

Lab Analysis

Analyze and document die results related to die lab exercise.


Questions
1. Analyze the details of die system such as user accounts, system MSI, hub ports, etc.
2. Find the IP address and Mac address of the system.





















































Không có nhận xét nào:

Đăng nhận xét