Lab Analysis & Hands on
BACKTRACK 5
Deris Stiawan
Ph.D Candidate | Universiti Teknologi Malaysia
In this contains material have steps of scanning and pentest, it use for learning only
and do in the private lab scenario. All kinds of problems incurred outside the
classroom thereafter is a crime and you are fully responsible
@2011
Scenario
Foot printing, Gathering Information
IP Address, MAC Address, Port,
Daemon / Application
Vulnerability / Holes
Penetration
(1) Hands on : Running Backtrack
• Live CD Backtrack (BT) 5 Rel. 1
• Loading BT from booting CD / DVD
• Choose : (1) Backtrack Text
• Wait until process is complete
• Command :
– root@bt5-stealth:# startx
Setting IP Address
• Find “Terminal” in above of desktop
• Root:# ifconfig
• Root:# Ifconfig eth0 ip add netmask
• Route add default gateway ip add
• Echo nameserver 161.139.16.2 >
/etc/resolv.conf
• Root:# Ifconfig eth0 up
(2) Hands on: Wireshark
• Click : Applications | Backtrack | Information
Gathering | Network Analysis | Network
Traffic Analysis | Wireshark
• OR on Terminal , typing command : Wireshark
(3) Hands on: nmap
• Typing nmap in the terminal
– Nmap –v –A ip target
• In the Terminal , typing command : Zenmap
– On Target : IP Address of target
– Profile : Choose the options
– Then Click Scan
(4) Hands on: Guessing Password
• Preparing dictionary / world list
• Open gedit from Application | Accessories
• Or typing in Terminar: gedit
• Then typing some word guessing / dictionary list ;
– Admin
– Password
– Handsome
– …
– Save: passlist.txt on root dir
Hydra
• On Terminal,
– Hydra -l username –P nameoffile.txt ip address services
– i.e :
– Hydra –l administrator –P passlist.txt IP Address Telnet
• Beware in your characters password, have in list of
dictionary, is very easy to guess. There are so many
dictionary in much language.
• Update patch your OS and applications.
• In your PC always update your antivirus and get personal
firewall
• Be paranoid in Internet, particularly with attachment file
from email / messenger
• Use your official personal email with care, don’t use it at
the time registration in underground / warez websites.
• Avoid download s/w or application from non official
website / underground / warez
Exercise
• Running and testing
– Applications | BackTrack | Stress Testing |
Network Stress Testing |
Lab Review & Analysis Question
• (1). Nmap;
– Type nmap –sP IP Address,
– Type nmap –Vv –A Ip Address,
– Type nmap –sS Ip address,
– Type nmap –O Ip address,
• Observe the output
• How many host did it find ?
• What is the IP Address of the host ?
• How long did the scan take ?
• What the result from this stages ?
• (2). Telnet & Wireshark
– Type in terminal, telnet IP Address target
– Open Wireshark
• Observe the output information from wireshark
• Find information user n password in wireshark
• What is protocol usage ?,
• What is the dominant protocol ?
• Observe handshake process the target and your host
• (3). Hydra & Wireshark & tcpdump
– Type Hydra –l administrator –P passlist.txt IP
Address Telnet
– Open & Running the Wireshark
– In the terminal, type tcpdump –X
• Observe the output information from wireshark &
tcpdump
• Observe handshake process the target and your host
• Draw it with your own, observation three way
handshake the target & host
• Contact :
deris@unsri.ac.id

More Related Content

PDF
Wireshark
PDF
Snort alert signatures
PDF
The Challenges, Gaps and Future Trends: Network Security
PPTX
Wireshark network analysing software
PPTX
Vulnerability and Penetration Testing
PPT
Wireshark Inroduction Li In
PPTX
Wireshark
PPTX
Network sniffers & injection tools
Wireshark
Snort alert signatures
The Challenges, Gaps and Future Trends: Network Security
Wireshark network analysing software
Vulnerability and Penetration Testing
Wireshark Inroduction Li In
Wireshark
Network sniffers & injection tools

What's hot (20)

PPTX
Wireshark
PDF
Wireshark Tutorial
PPTX
Wireshark Basic Presentation
PPTX
Prensentation on packet sniffer and injection tool
PPTX
Network packet analysis -capture and Analysis
PDF
Network Analysis Using Wireshark 1
PDF
Packet sniffing
PDF
Wireshark - Basics
PDF
Wireshark tutorial
PPTX
Wireshark
PDF
Network Forensics: Packet Analysis Using Wireshark
PPTX
Network based file carving
PDF
Ch 07 -- The Expert System
PPTX
Workshop Wireshark
PPTX
Packet Sniffer
DOCX
Wireshark lab getting started one’s unde
PPTX
PPTX
Network scanner
PPT
Module 5 Sniffers
Wireshark
Wireshark Tutorial
Wireshark Basic Presentation
Prensentation on packet sniffer and injection tool
Network packet analysis -capture and Analysis
Network Analysis Using Wireshark 1
Packet sniffing
Wireshark - Basics
Wireshark tutorial
Wireshark
Network Forensics: Packet Analysis Using Wireshark
Network based file carving
Ch 07 -- The Expert System
Workshop Wireshark
Packet Sniffer
Wireshark lab getting started one’s unde
Network scanner
Module 5 Sniffers
Ad

Similar to Scanning & Penetration Testing (20)

PDF
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
PDF
RIoT (Raiding Internet of Things) by Jacob Holcomb
PDF
BlackHat Hacking - Hacking VoIP.
PPTX
Network Securities.pptx
PPTX
After School cyber security class slides - Pat
PDF
Palo Alto Networks Sponsor Session
PPTX
Henrik Strøm - IPv6 from the attacker's perspective
PPTX
Security concepts
PDF
Network Situational Awareness with d00gle
PDF
IT262 CEH1 Unit 4 - Certified Ethical Hacker
PDF
The IPv6 Snort Plugin (at DeepSec 2014)
PPTX
Hacker Halted 2014 - RDP Fuzzing And Why the Microsoft Open Protocol Specific...
PPTX
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
PPTX
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
PDF
Alfresco Security Best Practices 2014
PPTX
The FatRat
PPTX
DC612 Day - Hands on Penetration Testing 101
PPTX
Protecting Financial Networks from Cyber Crime
PDF
Real World Application Threat Modelling By Example
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
RIoT (Raiding Internet of Things) by Jacob Holcomb
BlackHat Hacking - Hacking VoIP.
Network Securities.pptx
After School cyber security class slides - Pat
Palo Alto Networks Sponsor Session
Henrik Strøm - IPv6 from the attacker's perspective
Security concepts
Network Situational Awareness with d00gle
IT262 CEH1 Unit 4 - Certified Ethical Hacker
The IPv6 Snort Plugin (at DeepSec 2014)
Hacker Halted 2014 - RDP Fuzzing And Why the Microsoft Open Protocol Specific...
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
Alfresco Security Best Practices 2014
The FatRat
DC612 Day - Hands on Penetration Testing 101
Protecting Financial Networks from Cyber Crime
Real World Application Threat Modelling By Example
Ad

More from Deris Stiawan (15)

PPTX
Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...
PPTX
Strategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) Komputer
PDF
IoT : Peluang Riset di Bidang Kesehatan
PDF
Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...
PDF
Deteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc Network
PDF
Deteksi Serangan Denial of Service Menggunakan Artificial Imune System
PDF
Identifikasi Trafik Terenkripsi dengan Deep Packet Inspection
PDF
Trend Internet of Things
PDF
Network Attack and Intrusion Prevention System
PDF
Konsentrasi riset jaringan komputer
PDF
Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...
PDF
Trend & challenges Internet of Things
PDF
IDS / IPS Survey
PDF
Intrusion Detection/ Prevention
PDF
ICT for fighting Corruption
Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...
Strategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) Komputer
IoT : Peluang Riset di Bidang Kesehatan
Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...
Deteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc Network
Deteksi Serangan Denial of Service Menggunakan Artificial Imune System
Identifikasi Trafik Terenkripsi dengan Deep Packet Inspection
Trend Internet of Things
Network Attack and Intrusion Prevention System
Konsentrasi riset jaringan komputer
Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...
Trend & challenges Internet of Things
IDS / IPS Survey
Intrusion Detection/ Prevention
ICT for fighting Corruption

Recently uploaded (20)

PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PPTX
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
PDF
The Evolution of Traditional to New Media .pdf
PPTX
Internet Safety for Seniors presentation
PPTX
Basic understanding of cloud computing one need
DOCX
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
PPTX
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
PDF
Course Overview and Agenda cloud security
PDF
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PDF
Computer Networking, Internet, Casting in Network
PDF
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PPT
12 Things That Make People Trust a Website Instantly
PDF
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PPTX
Viva Digitally Software-Defined Wide Area Network.pptx
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
The Evolution of Traditional to New Media .pdf
Internet Safety for Seniors presentation
Basic understanding of cloud computing one need
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
Uptota Investor Deck - Where Africa Meets Blockchain
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
Course Overview and Agenda cloud security
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
Layers_of_the_Earth_Grade7.pptx class by
Computer Networking, Internet, Casting in Network
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
Alethe Consulting Corporate Profile and Solution Aproach
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
12 Things That Make People Trust a Website Instantly
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
Viva Digitally Software-Defined Wide Area Network.pptx

Scanning & Penetration Testing

  • 1. Lab Analysis & Hands on BACKTRACK 5 Deris Stiawan Ph.D Candidate | Universiti Teknologi Malaysia In this contains material have steps of scanning and pentest, it use for learning only and do in the private lab scenario. All kinds of problems incurred outside the classroom thereafter is a crime and you are fully responsible @2011
  • 2. Scenario Foot printing, Gathering Information IP Address, MAC Address, Port, Daemon / Application Vulnerability / Holes Penetration
  • 3. (1) Hands on : Running Backtrack • Live CD Backtrack (BT) 5 Rel. 1 • Loading BT from booting CD / DVD • Choose : (1) Backtrack Text • Wait until process is complete • Command : – root@bt5-stealth:# startx
  • 4. Setting IP Address • Find “Terminal” in above of desktop • Root:# ifconfig • Root:# Ifconfig eth0 ip add netmask • Route add default gateway ip add • Echo nameserver 161.139.16.2 > /etc/resolv.conf • Root:# Ifconfig eth0 up
  • 5. (2) Hands on: Wireshark • Click : Applications | Backtrack | Information Gathering | Network Analysis | Network Traffic Analysis | Wireshark • OR on Terminal , typing command : Wireshark
  • 6. (3) Hands on: nmap • Typing nmap in the terminal – Nmap –v –A ip target • In the Terminal , typing command : Zenmap – On Target : IP Address of target – Profile : Choose the options – Then Click Scan
  • 7. (4) Hands on: Guessing Password • Preparing dictionary / world list • Open gedit from Application | Accessories • Or typing in Terminar: gedit • Then typing some word guessing / dictionary list ; – Admin – Password – Handsome – … – Save: passlist.txt on root dir
  • 8. Hydra • On Terminal, – Hydra -l username –P nameoffile.txt ip address services – i.e : – Hydra –l administrator –P passlist.txt IP Address Telnet
  • 9. • Beware in your characters password, have in list of dictionary, is very easy to guess. There are so many dictionary in much language. • Update patch your OS and applications. • In your PC always update your antivirus and get personal firewall • Be paranoid in Internet, particularly with attachment file from email / messenger • Use your official personal email with care, don’t use it at the time registration in underground / warez websites. • Avoid download s/w or application from non official website / underground / warez
  • 10. Exercise • Running and testing – Applications | BackTrack | Stress Testing | Network Stress Testing |
  • 11. Lab Review & Analysis Question • (1). Nmap; – Type nmap –sP IP Address, – Type nmap –Vv –A Ip Address, – Type nmap –sS Ip address, – Type nmap –O Ip address, • Observe the output • How many host did it find ? • What is the IP Address of the host ? • How long did the scan take ? • What the result from this stages ?
  • 12. • (2). Telnet & Wireshark – Type in terminal, telnet IP Address target – Open Wireshark • Observe the output information from wireshark • Find information user n password in wireshark • What is protocol usage ?, • What is the dominant protocol ? • Observe handshake process the target and your host
  • 13. • (3). Hydra & Wireshark & tcpdump – Type Hydra –l administrator –P passlist.txt IP Address Telnet – Open & Running the Wireshark – In the terminal, type tcpdump –X • Observe the output information from wireshark & tcpdump • Observe handshake process the target and your host • Draw it with your own, observation three way handshake the target & host