Kali Linx Attacks Jim Nasto. Window 8 Computer On my Windows 8 64 bit OS machine. I started using a Virtual Machine using Hyper V Manager and shared the.

Slides:



Advertisements
Similar presentations
Musical Social Networking Using Real-Time Audio Transport Software Research Conducted by Justin A. Gutierrez Advisor: Miller S. Puckette Cal-IT 2 Undergraduate.
Advertisements

Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
Networking By: Matt Motl… Programmer Brent Everson… Programming Mentor.
Net security - budi rahardjo Overview of Network Security Budi Rahardjo CISCO seminar 13 March 2002.
Crack WPA Lab Last Update Copyright 2014 Kenneth M. Chipps Ph.D.
Boot Mode. Agenda 1.What can I do if I forget my password? 2.What to do if My Gateway can’t enter into [usr/config] mode?
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
University of Michigan Residence Halls Networking In-Room Student Registration System
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
How’s My Network (HMN)? A Java approach to Home Network Measurement Alan Ritacco, Craig Wills, and Mark Claypool Computer Science Department Worcester.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
URL Obscuring COEN 152/252 Computer Forensics  Thomas Schwarz, S.J
Wireless Networking By Brian Bogue. Change Access Password.
(NHA) The Laboratory of Computer Communication and Networking Network Host Analyzer.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
MIS Week 3 Site:
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
Designing a Home Network By Tabby Booth. Network Components Motorola Cable Modem Wireless 4 port Linksys Router Compaq Desktop Computer – NIC card HP.
Fermilab VPN Service What is a VPN ?.
RADIUS Server (Brocade Controller)
How to connect your laptop to the classroom wireless AP.
© 2007 NeoAccel, Inc. NeoAccel SGX Installation Guide Dear Customer: We are pleased to provide you with our training presentation for our SSL VPN-Plus.
Operating Systems Networking for Home and Small Businesses – Chapter 2 – Introduction To Networking.
COMP1070/2002/lec3/H.Melikian COMP1070 Lecture #3 v Operating Systems v Describe briefly operating systems service v To describe character and graphical.
COEN 252 Computer Forensics
OpenStack Usage Guide By Yaman Sertdemir. Usage Guide of Openstack After connecting to the VPN network, open a browser and enter below address: /horizon.
N ETWORKED & D ISTRIBUTED COMPUTING S YSTEMS L AB Programming Assignments EE323 Computer Networks.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
WIRELESS NETWORKS AT HOME Presentation 9 th December 2004 Simon G Fraser.
PC Maintenance: Preparing for A+ Certification Chapter 23: Using a Windows Network.
If you are prompted for credentials when opening Internet Explorer, try this first: For the username, delete everything and type in NACOKECCE\E-id and.
SCSC 555 Frank Li.  Introduction to Enumeration  Enumerate Microsoft OS  Enumerate *NIX OS  Enumerate NetWare OS (skip) 2.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
CHAPTER 9 Sniffing.
URL Obscuring COEN 252 Computer Forensics  Thomas Schwarz, S.J
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Social Engineering Toolkit Computer Science Innovations, LLC.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
MOE – Experience 1.What do you get 2.It just works 3.Same look and feel across the university 4.Your documents and desktop available.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Objectives Blue Color VLAN’s Should reach Message Server from all locations Red Color VLAN’s Should not Reach Message Server In Each L2 Switch Blue Color.
By Mohammad Alsawwaf. To apply the theory part from my last presentation into the application part (The lab)
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send messages,
CCNA1 v3 Module 1 v3 CCNA 1 Module 1 JEOPARDY K. Martin.
Doc.: IEEE /044r0 Submission January 2003 Al Petrick, IceFyre, Tim Godfrey, IntersilSlide 1 Electronic Attendance and Server Update Tim Godfrey.
Connecting to the eTeacher FTP on Win XP eTeacherGroup 2010.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
1 E-Site - FTP Services Setup / install guide. 2 About FTP services can run on any desired port(s) Runs as a windows service Works for all sites installed.
/Reimage-Repair-Tool/ /u/6/b/ /channel/UCo47kkB-idAA-IMJSp0p7tQ /alexwaston14/reimage-system-repair/
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Penetration Testing Exploiting I: Password Cracking
Intro to Ethical Hacking
Penetration Testing Social Engineering Attack and Web-based Exploitation CIS 6395, Incident Response Technologies Fall.
Web Application Penetration Testing ‘17
MySQL Exploit with Metasploit
Backdoor Attacks.
Introduction to Operating Systems
Intro to Ethical Hacking
Backtrack Metasploit and SET
Cyber Operation and Penetration Testing Social Engineering Attack and Web-based Exploitation Cliff Zou University of Central Florida.
How to install HP printer using IP address? How to install HP printer using IP address? Call
Gurpreet Singh CSE/IT.
What is an operating system An operating system is the most important software that runs on a computer. It manages the computer's memory and processes,
Presentation transcript:

Kali Linx Attacks Jim Nasto

Window 8 Computer On my Windows 8 64 bit OS machine. I started using a Virtual Machine using Hyper V Manager and shared the NIC Card across the Windows 8 machine and the Virtual machine created using a virtual switch. I loaded the Kali System needed to be ant-get update and ant-get upgrade. I ensured the systems were in the same sub net and were able to ping one another.

Ensure communication Windows 8 IP Address: Kali Linx IP Address:

Booting SE Tool Kit Started the SE Toolkit with./setoolkit

Credential Harvester Selecting 3 will initiated the credential harvester attack. Ensure the IP Address used for the server is correct to the system.

Credential Harvester The Credential Harvester successfully cloned the facebook.com and allow the user to enter their username and password. After the user enters these he was taken to the real facebook.com webpage and while the username and password are saved in the webserver created by Kali. This was tested with the Windows 8 machine as the victim and with a Linux Laptop attached to a wireless network. Kali webserver extracted both username and passwords.

Java Applet Attack Method Selecting 1 will initiated the java applet attack method. Ensure the IP Address used for the server is correct to the system.

Java Applet Attack Method The Java applet attack method logged the visit to the webserver and open connection to port 8080 between the Windows Machine and the Virtual Kali Machine.

Metasploit Brower Exploit Method This attack would generate this data on the webpage that visits the IP address of the Kali webserver.

Notes I wanted to try different operating systems like Windows XP but I was unable to create a virtual machine of a Windows XP. I wanted to see how the different attacks would be different from Windows 8 and Windows XP. And if they made any security upgrades with Windows 8. I found the Kali tools very helpful and easy to use for intrusion detection testing.