Sunday, 3 March 2013

Practice Session On Backtrack 5


PRACTISE SESSION 
PRACTICE SESSION ON BACTRACK 5

INTRODUCTION 
  • We have cover lots of tools of backtrack 5 on www.hackingdna.com . And still we miss a practise session . 
  • So i decided to create practice session . 
  • Level : The level of this session is Beginner .
  • Soon new levels will be added . 
  • I hope you like this concept on hackingDNA .
REQUIREMENTS
  • The softwares and operating system i have used in this tutorial are as follows :- 
  1. VMWARE WORKSTATION 
  2. OPERATING  SYSTEMS : Windows Xp ,Metasploitable, Backtrack 4 
  3. Beer ( According to your limit ) : This is optional . 
MAIN OBJECTIVES OF THIS PRACTISE SESSION 

Using nmap , you have to explore the virtual network ? Find these points -
  1. Find the live host on your network .
  2. Scanning the specific port ranges from 1-65535 . Scan atleast 3 hosts .
  3. Use XPROBE2 to find the OS running on anyone of the ip and  for rest of the ip addresses use nmap aggressive mode  to find OS, Version , and traceroute information . 
  4. Do a vulnerability scanning with nessus of your network .
This practise session looks so simple . Try it learn it and gain it . 

Note : You can only use Backtrack 5 r3 to complete this practise session . 

VIRTUAL NETWORK IMAGE VIEW  

VIRTUAL NETWORK ON BACKTRACK 5
VIRTUAL NETWORK 

FINDING LIVE HOST ON THE NETWORK 
  • From the above image it is clear that what is the scenario of our virtual network . Now lets find live hosts  on backtrack 5 r3 machine . 
  • Command used : nmap -sP 192.168.85.1/24
  • See the below image for more details -
FINDING LIVE HOSTS ON THE NETWORK
FINDING LIVE HOSTS ON THE NETWORK 

SCANNING THE SPECIFIC PORT RANGES 

  • To complete this process you have to select one host from the last step . And in my case i have selected the ip : 192.168.85.144
  • Now how to perform a port scanning through nmap , the answer is simple .Remember this one command .
  • Command Used : nmap -p1-65535 <target ip >
EXAMPLE IMAGE 
  • SCANNING IP : 192.168.85.144
  • It shows the port number with protocol , state and services running on the ip :192.168.85.144
  • See the below image for more details -
SCANNING THE PORT RANGES
SCANNING THE PORT RANGES 

EXAMPLE IMAGE 2 

  • SCANNING IP : 192.168.85.129
  • Command used : nmap -p1-65535 192.168.85.129 
  • See the ouput for more details - 
SCANNING THE PORT RANGES
SCANNING THE PORT RANGES 


EXAMPLE  IMAGE 3

SCANNING IP : 192.168.85.1

SCANNING THE PORT RANGES
SCANNING THE PORT RANGES 
XPROBE 2 
  • IP ADDRESS : 192.168.85.144
  • Command Used : ./xprobe2 -v 192.168.85.144
  • OS DETECTED : Windows XP SP2 (100%)
  • See the below image for more details - 

XPROBE2
XPROBE 2 
AGGRESSIVE DETECTION  USING NMAP 
  • Through this aggressive detection you can identify the OS , version detection , and the traceroute . 
  • Command Used : nmap -A <target ip >
  • See the below image for more details - 

AGGRESSIVE DETECTION MODE
AGGRESSIVE DETECTION MODE
AGGRESSIVE DETECTION MODE
AGGRESSIVE DETECTION MODE
IP ADDRESS : 192.168.85.144 
  • See the below image for the output .

AGGRESSIVE DETECTION MODE
AGGRESSIVE DETECTION MODE 

VULNERABILITY SCANNING WITH NESSUS 

INTERNAL  WINDOWS XP 
IP ADDRESS : 192.168.85.144
REPORT FORM : HTML FILE
DOWNLOAD  FULL REPORT ( FILE SIZE 66 KB ) 
See the below image for more details - 

VULNERABILITY SCANNING WITH NESSUS
VULNERABILITY SCANNING WITH NESSUS 

VULNERABILITY SCANNING WITH NESSUS
VULNERABILITY SCANNING WITH NESSUS 

SCANNING METASPLOITABLE 
IP ADDRESS : 192.168.85.145
REPORT FORM : HTML 
REPORT IMAGES : SHOWN BELOW 
DOWNLOAD FULL REPORT LINK ( FILE SIZE 135KB )

METASPLOITABLE
METASPLOITABLE 

METASPLOITABLE NESSUS  REPORT 

CONCLUSION 
  • With this practise session you  can learn how to work on virtual network .
  • How to find hosts on virtual networks .
  • You learn how to do port scanning from 1 to 65535 port range . 
  • You also  practise how to use XPROBE 2 to identify the OS running on the ip address . 
  • Also we will not stop here to find more additional information we use aggressive mode in nmap . 
  • And at last but not the least we audit the internal network with nessus vulnerability scanner  
  • Also i have uploaded the nessus reports of my internal audits . you can download it freely .
  • And at last i dont think so now i have to explain how to exploit the target . All the vulnerabilities is in the report . Just use armitage ( GUI ) based and metaspoit framework (CUI ) based to get the remote shell of vulnerable ip's . 
  • If you need  more help visit www.hackingdna.com .
  • More practise session will come soon . Till then have a good day guys . 
THIS  PRACTISE SESSION IS JUST FOR EDUCATIONAL PURPOSE ONLY /-
ALL THE AUDIT PERFORM HERE IS JUST FOR EDUCATION , DON'T TRY IT ON ANY ORGANISATION UNTIL YOU DON'T HAVE PERMISSION . IF YOU DO AND CAUGHT IN ANY ACTIVITY , YOU YOURSELF RESPONSIBLE FOR IT . 

ITS BETTER FOR PRACTISE CREATE YOUR OWN VIRTUAL NETWORK AND SHARP YOU PENETRATION TESTING SKILLS . 

CATCH YOU SOON  WITH NEW PRACTISE SESSION 

JOIN US 
ON 
FACEBOOK



THIS TUTORIAL IS JUST FOR EDUCATIONAL PURPOSE ONLY /-

0 comments:

Categories

Angry IPScanner On Backtrack 4 Arduino Arduino Opensource community attacks on router auditing tool Aurora Exploiting Through Kali Linux AUTOSCAN ON BACKTRACK 5 BackBox Linux On hackingDNA Backtrack 5 : Linux Commands Backtrack Bootable Pendrive Backtrack Tool : The Harvester Blender On Backtrack 5 Block Command Prompt Browser Autopwn On Backtrack 5 BUGTRAQ LOG REMOVER BLEACHBIT chkrootkit on Backtrack 5 chntpw on backtrack 5 cisco switches routing auditing tool. Client Side Attack On Backtrack 5 Command Shell Upgrade On Backtrack 5 Conky On Backtrack 5 convert guest account into admin using chntpw in backtrack 5 Convert Jpg Image into Ascii on Backtrack 5 countermeasures Cracking Unix Password On Backtrack 5 Cupp On Backtrack 5 Cutycapt On Kali Linux Detect Sniffer6 On Kali Linux dmitry on backtrack 5 Dnmap On Kali Linux dnsenum on backtrack 5 dnsrecon on backtrack 5 dnstracer on backtrack 5 dnswalk on backtrack 5 DOMAIN TOOL ON BUGTRAQ Dos attack driftnet on backtrack 5 dsniff on backtrack 5 enum4linux esp8266 EtherApe On BackTrack 5 ewizard on backtrack 5 ExifTool On BackTrack 5 Exploit Distccd On BackTrack 5 Exploit RDP Vulnerability On Kali Linux Exploit Samba Server On Backtrack 5 fatback on backtrack 5 FERN CRACKER ON BACKTRACK 5 Fierce in Backtrack 5 findmyhash : Crack the hash on Backtrack 5 Firewalk-Script On BackTrack 5 Firewall On Backtrack 5 Flash Player On Backtrack 5 Genlist On Backtrack 5 Gerix Cracker On Backtrack 5 Get Your Data Back Golismero On BackTrack 5 GOOFILE ON BUGTRAQ Google Kung-Fu goohost on backtrack 5 Grendel-Scan On Backtrack 5 gtk-recordmydesktop on backtrack 5 HACK BACKTRACK 5 via RAT Hack The Database with Backtrack 5 Hack the Facebook with Backtrack 5 Hack the windows in GNS3 Hack Windows XP using Backtrack 5 Hack Windows Xp using msfconsole hacking Hacking Lab 01 Hacking Windows 7 USING Backtrack 5 hackingdna hackingDNA choice :Best Antivirus Detection honeyd on backtrack 5 honeypot on backtrack 5 HOW TO INSTALL REDHAT ENTERPRISE LINUX 5 How to block ICMP request How To Install CAINE How to Install Chromium Browser on Backtrack 5 How to Install Windows 7 Ultimate How To Install Xampp On Kali Linux How to make new User in Backtrack 5 How to see files and directories on Linux how to use arduino in kali linux How to use Host Command on Backtrack 5 How to use Nano Editor on Backtrack 5 How to use Ping Command on Backtrack How to use whois tool on Backtrack 5 hping2 on backtrack 5r2 Httprint On BackTrack 5 icmpv6 flooding attack ifconfig command Installing And Accessing Backdoor On Backtrack 5 Installing software on Backtrack 5 using apt-get ipcalc on backtrack 5 Itrace On BackTrack 5 Jigsaw On Backtrack 5 Joomscan On Backtrack 5 KALI ARMITAGE ON KALI LINUX kali linux kali linux arduino Kali Linux Installation Kali Rolling Release 2016.2 keimpx on backtrack 5 Lanmap On Backtrack 4 Learn arping on Backtrack 5 Learn Basic of Internet with DAWN OF THE NET Learn Basics if Screen Utility Learn cmospwd on Backtrack 5 Learn dnsdict6 on backtrack 5 Learn fping on Backtrack 5 Learn Help Utilities Command On Backtrack 5 Learn hexedit on Backtrack 5 Learn how to hack root account on REDHAT5 Learn How to Install Backtrack 5 Learn how to make Bootable Pendrive Learn how to split Terminal into different regions Learn How To Split Terminal on backtrack 5 Learn how to use Armitage in Backtrack 5 Learn how to use chntpw on backtrack 5 LEARN HOW TO USE CISCO PACK ON BUGTRAQ - II Learn How to use ettercap on Backtrack 5 for hacking username and passwords Learn how to use Netstat Commands On Backtrack 5 Learn how to use nipper Learn How to work with Vim editor on Backtrack 5 Learn Linux Commands on Backtrack Environment Learn Netdiscover On Backtrack 5 Learn Pentbox On Backtrack 5 Learn Recoverjpeg on Backtrack 5 Learn samdump on backtrack 5 Learn TrueCrypt On Backtrack 5 LINUX NETWORKING COMMANDS ON BACKTRACK 5 linux OS LINUX PARTITION ON BACKTRACK 5 List-Urls On Backtrack 4 Load Balancing Detector On Backtrack 5 LOG REMOVER BLEACHBIT Lynis On Backtrack 5 Mac Tracker On Backtrack 5 macchanger on backtrack 5 Matriux Installation On hackingDNA Metaexploit Framework : Collecting Email Addresses Metasploit Framework With Basic Commands Meterpreter on Backtrack 5 mitre-cve on backtrack 5 MSF AUXILIARY SCANNING ON BACKTRACK 5 msf scanning on backtrack 5 nbtscan on backtrack 5 NESSUS ON BACKTRACK 5 Net Card Config Netcat : Learn how to create a instant chat session on Backtrack 5 netenum on backtrack 5 Netifera On Backtrack 5 NETMASK On Backtrack 5 NIKTO ON KALI LINUX Nmap Scanning On Backtrack 5 nmap smb script offensive security Oneko And Cowsay On BackTrack 5 OpenOffice On Backtrack 5 OpenVAS On Backtrack 5 Orion Browser History Dumper v1.0 Penetration Testing Pipal On Backtrack 5 PostgreSQL On Kali Linux Practice Session On Backtrack 5 PROTOS on backtrack 5 Reconnaissance Recover Kali Password Remote Desktop Connection Remote Desktop On Backtrack 5 Remote Desktop Sharing Removing Backdoor on Backtrack 5 Restrict Control Panel Restrict Registry Editor by Group Policies Rkhunter On Backtrack 5 router auditing tool Router Penetration Testing router security Safecopy On Backtrack 5 samba testing samrdump on backtrack 5 Scanning security auditing tool Shell Scripting On Kali Linux Shrink and Create Partition on Windows 7 Shutter On Backtrack 5 siege on backtrack 5 smb enumeration smb hacking Smbclient On Backtrack 5 Smtpscan On Backtrack 5 SMURF6 ON KALI LINUX Sniff Images on Backtrack 5 using Driftnet Snort On Backtrack 5 snurf6 Software Updates On Kali linux Spoof Your MAC Address on Backtrack 5 sql attack SSID ssldump on backtrack 5 sslstrip on backtrack 5 Start Backtrack 5 Without Startx Steam Locomotive On BackTrack5 Stop Bruteforce attack System Monitor On Backtrack 5 tcptraceroute on backtrack 5 Tctrace On Backtrack 5 TeamViewer On BackTrack 5 TELNET On Backtrack 5 Terminator On Backtrack 5 the Harvester On Backtrack 5 Things you should know about Backtrack Tweak Your System Settings On Backtrack 5 Tweak Your System Settings On Backtrack 5 Part 2 Unicornscan On BackTrack 5 Uniscan On Backtrack 5 urlcrazy on backtrack 5 urlsnarf on backtrack 5 WBOX on Backtrack 4 and 5 Weak points Web Httrack::Web Copier Websecurify On BackTrack5 Webshag On Backtrack 5 WEP CRACKING ON BACKTRACK 5 whatweb on backtrack 5 WHATWEB ON BUGTRAQ Wiffit (wafw00f): Firewall Detection Tool On Backtrack 5 wireshark Xpdf On Backtrack 5 xprobe2 on backtrack 5 Zenmap

Popular Posts