Ns 6-10 - Removed
Ns 6-10 - Removed
NO:6(C)
MAN-IN-THEMIDDLE
DATE:
AIM :
To guide Man In The Middle Attack and resolved it.
INTRODUCTION :
A man-in-the-middle (MITM) attack is a malicious technique in which an attacker intercepts
and possibly alters the communication between two parties by positioning themselves
between them.
By exploiting vulnerabilities in the communication channel, the attacker gains unauthorized
access to sensitive information without the knowledge of the communicating parties.
Steps To Perform Advanced Man-in-the-Middle Attacks with Xerosploit
Step 1: Clone the official Xerosploit repository from Github using the git clone command.
git clone https://github.com/LionSec/xerosploit
Step 2: Change the directory to xerosploit using the cd command. and then install the
xerosploit.
sudo cd xerosploit
sudo python install.py
Step 3: Install it’s all dependencies using the following command:
sudo apt install nmap hping3 build-essential ruby-devlibpcap-dev libgmp3-dev
Step 6: Use the commands for various purposes like scanning the network use the below
command.
Scan
Step 7: Select the target and run the module you want to execute.
EX.NO:8
AIM
To demonstrate Intrusion Detection System(IDS) using Snort software tool.
13. Go back to the extracted rules archive and locate the "etc" folder.
14. Inside the "etc" folder, find the "snort.conf" file.
AIM
To achieve the network monitoring tools with the required function and softwares
INTROUDCTION:
Networks are the fundamentals behind businesses worldwide. It plays a pivotal role in
serving your employees for administrative purposes and your clients across the continents.
The networks help you keep information in a centralized location - accessible to those who
need and restrict every other inbound request. So how do you provide continuous top-notch
end user experience and maintain your rapidly evolving network? Only by monitoring the
availability, health, and performance of your networks over time with the help of reliable,
real-time network monitoring tools.
VPN monitoring
Organizations allow connections into their networks through VPNs for their remote
workforce. These connections can sometimes be compromised, resulting in data theft or
network attacks. With a monitoring tool like OpManager, you can monitor your VPN by
tracking the number of active VPN sessions, VPN tunnel status, and VPN tunnels count in
real time, and also receive instant alerts on VPN connection regularities making your network
secure and keeping your remote productivity issues at bay.
Hybrid environment monitoring
Every organization's network has unique needs, so top-of-the-line networking technologies
are employed to address them. This helps networks deliver business services but also poses a
challenge with monitoring and managing the network. Using multiple network management
tools is not efficient and cost effective. With OpManager, apart from monitoring switches,
servers, etc., you can monitor VMware, Hyper-V, Hypervisors, Cisco UCS, Nutanix
infrastructures, and more, all within a unified console, making it the best network monitor.
Additionally, you can monitor your WAN with Cisco IP SLA using OpManager.
Mobile application
Access your OpManager's network monitoring and reporting anytime and anywhere using the
new ManageEngineOpManager mobile application. Available for both Android and iOS,
thislets you visualize your infrastructure, act on the alerts, drill-down to the root cause of the
problem without having to be physically present in your server room to resolve a fault!
OpManager makes your work easy
Apart from the above, OpManager, your comprehensive network monitoring solution
monitors Windows servers, Linux servers, storage devices, Windows services, processes and
scales upto 30,000 devices out of the box. This network software makes network monitoring
effortless with intelligent automations, ML-based forecasting, and extensive protocol support.
percent, 90 percent, and 100 percent of the allocated storage, and helps with planning
purchase decisions.
2. Notification profiles: OpManager lets you notify network faults via Slack channels, trouble
tickets, emails, SMS, and web alarms if they are not acknowledged, so no alarm goes
unnoticed.
3. Alarm Escalation: Alarm escalation rules can be configured for mission-critical devices
such as application servers, so any fault pertaining to availability, health, and performance is
escalated to a higher authority via email or SMS based on user-defined criteria.
4. Support for multiple vendors: OpManager offers support for more than 53,000 vendor
templates, so you can efficiently manage your network devices from vendors such as Cisco,
Juniper, Fortigate, and many more. These templates can also be customized to address your
organization's unique needs.
5. Support for wide range of protocols: OpManager supports communication protocols such
as ICMP, and LAN management protocols such as SNMP, WMI, CLI, and more.
6. Discovery Rule Engine: Discovery Rule Engine automatically associates device templates
and rules to network devices as defined by the user, thereby automating routine tasks, and
saving valuable time and resources.
7. In-built troubleshooting tools: OpManager offers multiple tools such as Ping, SNMP Ping,
Proxy Ping, Traceroute, WMI Query Tool, CLI Query Tool, and more that aid in
troubleshooting network issues within OpManager.
10. Multi-level thresholds: OpManager offers multi-level thresholds with color codes, so you
can identify show-stopping network faults and promptly take action.
EX.NO:7
AIM:
To guide Sniff Traffic Using Arp Poisoning and resolved it.
You will get detailed information about all the network connections available on your
computer. The results shown below are for a broadband modem to show the MAC address
and IPv4 format and wireless network to show IPv6 format.
physical addresses [MAC address] on a switch. The host sends an ARP broadcast on the
network, and the recipient computer responds with its physical address [MAC Address]. The
resolved IP/MAC address is then used to communicate. ARP poisoning is sending fake
MAC addresses to the switch so that it can associate the fake MAC addresses with the
IP address of a genuine computer on a network and hijack the traffic.
address resolution and certify them if they are authenticated. Uncertified IP/MAC address
resolutions can then be blocked.
Operating System Security: this measure is dependent on the operating system been used.
The following are the basic techniques used by various operating systems.
The following list includes some of the software that can be used to protect
networks against sniffing;
AntiARP– provides protection against both passive and active sniffing
Mac OS: ArpGuard can be used to provide protection. It protects against both
active and passive sniffing.
arp –a
HERE,
aprcalls the ARP configure program located in Windows/System32 directory
Static entries are added manually and are deleted when the computer is restarted, and the
network interface card restarted or other activities that affect it.
The MAC address is represented using the Physical Address and the IP address is
IPv4Address
arp –a
You will get the following results
Note the IP address has been resolved to the MAC address we provided and it is of a static
type.
arp –d 192.168.1.38
P.S. ARP poisoning works by sending fake MAC addresses to the switch