{"id":199,"date":"2020-10-23T20:29:00","date_gmt":"2020-10-23T13:29:00","guid":{"rendered":"http:\/\/beauty27.blog.binusian.org\/?p=199"},"modified":"2021-01-08T10:39:40","modified_gmt":"2021-01-08T03:39:40","slug":"week-10-3","status":"publish","type":"post","link":"https:\/\/beauty27.blog.binusian.org\/?p=199","title":{"rendered":"Week 6"},"content":{"rendered":"\n<p>Capturing Passwords and Usernames<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>IP of the Kali Linux attacked : 192.168.100.6<\/strong><\/p>\n\n\n\n<p><strong>IP of the Kali Linux attacking : 192.168.100.7<\/strong><\/p>\n\n\n\n<p>1.<br><\/p>\n\n\n\n<p>Ping&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/yoQ5bfVba_E9Pm6Yl_oByCEIgiPVoanFoYx_B2BEdTvO9neauy7ElZdNcpsShVFXZsRCxWaGHfy8VaFEuVSfLhFx-Q5e5aulCZLCQzLK4ySAE9SOUvcGOSm9X5gDxTVz1oIzUyiY\" alt=\"\" \/><\/figure>\n\n\n\n<p>FTP Brute force<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/OSLIwq-aOa_c69eZP31TDlEULusp58H4DNQau2xn6x9nHoszsaqJ9Yo6q4kcNM4A0n3T85i6Sr8ZmtQdvuWx1qyW--5gOybrtLCL5SJV-3XF5tKlPRRtVmD8MPkX7y4qbh1C1Bxk\" alt=\"\" \/><\/figure>\n\n\n\n<p>Correct password<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/cy1OBLtBFAUF1Skao9ZUyD6rswyv3QeKncLJixfKZpoiQifY7MyZa8qwevICSLNA5srgvaxS4nDmSwsVaDbzgXgJ7ZCZwpHoyRGG8ow1AjonYS90gd-hRu97dnReAW_L7Qd-05qt\" alt=\"\" \/><\/figure>\n\n\n\n<p>Ssh remote host<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/MUEP8PL6tZdewd-dvjMCeEURkIR39gvmrOhVc5l7TFW4UTidbFaDFW9_QfDNbWePEFa_X5PLbSJQCwmdDsDgndbFBTb4suMdWe6idZ7WJl5PPlTNdigAPWGy4j-wAC3jEeRSB2Gj\" alt=\"\" \/><\/figure>\n\n\n\n<p>Scan using Nmap to generate traffic<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/2xryMx8182DOX28BQr_9WAlcQKyVfDIOCuYt5HcWhpQuYuQLMHFaLU7WmctTo8_ULwwJ5-UprzZYHsnF4Lwb2Fv4fLxjtfqeuT3o3jwPJkgphRoMHzQgXevh_ynm-MPKA0MQWzua\" alt=\"\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Statistics<br><\/p>\n\n\n\n<p>This shows the hierarchy of the protocols and the number of packets per protocol<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/bBibL7iJhs4matVBBDva83MQ7DvLUlxNGTNR3yfQ2nrO6p7e5b1eU5EwoNtIm_n2j4E3RtyBb6dCFq-CSaOTp4cZ-_yUQvGm9Celim9zmvGoLITG9ROIOR7On4hiWxB4t5Ih4v8I\" alt=\"\" \/><\/figure>\n\n\n\n<p>HTTP content<br><\/p>\n\n\n\n<p>The content of one http packet from accessing the text file created in the host kali.&nbsp;<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/u2PUla0tXh2pXh5mR_wl43bJNuli6jsThKq1abjOigPvNi4RfeXctpu2Jk8lqPqMWaRZTeIBVsf3gu0QTuQCl0ACK-_OxOBq-eIB5a8k4QLd8mi0vqtxB3tYbbVYi4UfirIXylMy\" alt=\"\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/NaTAK4VHrZeYRg71dx_5iPc4NUU1_fMJZyF_dga5KT7PPPhNUoT89nQmnOsyN6x3BBJLBQQJwpuhKAsPQxoRT6xPzvEmiYD7LZjh8hFSemLwocLaqUjauix1IGg34Qzn5Q5vFsns\" alt=\"\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>FTP brute force<br><\/p>\n\n\n\n<p>This is showing all the traffic generated from the brute force<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/y-LNiRSSiz2OGVW0NBWGvFPNB8FYymw8OppH1xfx3RPEE4_y_rIRHmYESnjkwAq79MGU8xv-FTKHnPUR1LeaOIScqhaRoqMis74D460WCJoA4ID5Xe6ZEkpRojsGwLxlHRnWO97H\" alt=\"\" \/><\/figure>\n\n\n\n<p>We can get the credentials from the brute force<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/CdkhX_gveElpfXR9S7l5PvbydCwn-PxZ3S-NwTRLIlgVP6uMewwMu39D_Xj7f9a2dXMvnoo38XEkxmGS7B0xSL6IY7bqqFsqQljFy9nBsTAL0tx1gcWU22f1Hn0G2FC8t-l0f8Iz\" alt=\"\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Capturing Passwords and Usernames IP of the Kali Linux attacked : 192.168.100.6 IP of the Kali Linux attacking : 192.168.100.7 1. Ping&nbsp; FTP Brute force Correct password Ssh remote host Scan using Nmap to generate traffic Statistics This shows the hierarchy of the protocols and the number of packets per protocol HTTP content The content [&hellip;]<\/p>\n","protected":false},"author":9231,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-199","post","type-post","status-publish","format-standard","hentry","category-networkforensics"],"_links":{"self":[{"href":"https:\/\/beauty27.blog.binusian.org\/index.php?rest_route=\/wp\/v2\/posts\/199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beauty27.blog.binusian.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beauty27.blog.binusian.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beauty27.blog.binusian.org\/index.php?rest_route=\/wp\/v2\/users\/9231"}],"replies":[{"embeddable":true,"href":"https:\/\/beauty27.blog.binusian.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=199"}],"version-history":[{"count":3,"href":"https:\/\/beauty27.blog.binusian.org\/index.php?rest_route=\/wp\/v2\/posts\/199\/revisions"}],"predecessor-version":[{"id":202,"href":"https:\/\/beauty27.blog.binusian.org\/index.php?rest_route=\/wp\/v2\/posts\/199\/revisions\/202"}],"wp:attachment":[{"href":"https:\/\/beauty27.blog.binusian.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beauty27.blog.binusian.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beauty27.blog.binusian.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}