You are on page 1of 25

Gii thiu hping tool

-Tool:

Hping2 or Hping3 - OS: Linux -Dowload: http://www.hping.org -Ci t: - Trn linux: ubuntu, backtrack apt-get install hping - trn backtrack h tr hping khng cn ci - C th ci gi trc tip : hping-20051105.tar.gz

Ni dung
Gii thiu hping tool Cc la chn ngha dng lnh Hn ch Demo

Gii thiu hping tool


Hping l command-line hng kt ni TCP/IP. Ngoi gi cc yu cu ICMP echo. N cn h tr cc giao thc TCP, UDP, ICMP, ch traceroute Hping <option> <target>

Gii thiu hping tool


Port Scanning - TCP SYN Scan Vidu:Hping2 S 192.168.16.222 p 80 c 1 - TCP ACK Scan Thc hin thit lp c ACK trong cc gi tin thm d - Cc kiu scan khc

Gii thiu hping tool

ICMP Ping (-1)


Icmp loai 13 (timestamp) : yu cu thi gian trn h thng, xem mi thi gian ti v tr ca h thng C 13 Icmp loi 17 (address mask request) netmask ca th mng c th xc nh r tt c cc mng cp di ang c s dng C 17

TCP Ping (-S) UDP Ping (-2) Scan mode scan (-8)

Cc option
Kim tra ICMP Hping2 -1 target Traceroute s dng ICMP. Ging vi tracert trong windows v linux s dng cc gi icmp tng mi ln mt gi tr TTL ca n Hping2 traceroute V -1 target Traceroute xc nh cng xem ni gi tin ca bn b chn. Hping2 traceroute V S p 80 0daysecurity.com

Cc option

Kiu khc ca port scanning. Chng ta s th FIN scan. Trong kt ni TCP c FIN flag c s dng bt u mt kt ni thng xuyn. Nu chng ta khng nhn c tr li th cng m. Thngthng tng la s gi mt gi tin RST ACK bo hiu rng cng ng Hping2 -c 1 V p 80 F 0daysecurity.com ACK Scan. C th c s dng xem nu mt host cn sng (khi ping b chn). iu ny s gi phn hi RST tr li nu cng c m. Hping2 -c 1 V p 80 A 0daysecurity.com

Cc option
Xmas Scan: thit lp th t s 0 v thit lp URG + PSH + c FIN trong gi tin. Cng ng nu cc thit b mc tiu gi gi tin TCP RST. Cng m nu target loi b qut TCP Xmas, gi khng tr li. Hping2 c 1 V p 80 M 0 0daysecurity.com Null Scan: thit lp l 0, khng c c flag thit lp trong gi tin. Nu TCP port ng, thit b gi gi tin TCP RST reply. Nu TCP port m, mc tiu loi b qut TCP NULL , gi khng tr li. Hping2 -c 1 V p 80 Y 0daysecurity.com

ngha dng lnh

len=46 ip=192.168.1.1 flags=RA DF seq=0 ttl=255 id=0 win=0 rtt=0.4 ms Len:Kch c, bng bytes ca data c c t data link layer Ip:a ch ip ngun Flags:The TCP flags: R for RESET, S for SYN, A for ACK, F for FIN, P for PUSH, U for URGENT DF:Nu s tr li bao hm c DF, IP Header c "don't fragment" c t seq :S lng gi thu c s dng ngun chuyn cho TCP/UDP packets hoc sequence field cho ICMP packet. Id:lnh vc IP ID Win:kch thc ca s TCP

ngha dng lnh

Rtt:Thi gian kh hi tnh bng mili-giy Nu bn chy hping s dng "-V" +"dng lnh", n s trnh by v gi b xung. Chng hn: len=46 ip=192.168.1.1 flags=RA DF seq=0 ttl=255 id=0 win=0 rtt=0.4 ms tos=0 iplen=40 seq=0 ack=1223672061 sum=e61d urp=0 Tos:Kiu dch v trong IP Header Iplen:IP total len field seq and ack:S ni tip nhng s 32bit v s ghi nhn trong IP Header Sum:Tng kim tra IP Header urp:Gi tr khn cp trong TCP

Hn ch
Khng th dng c script pht hin im yu Khng c giao din cho h iu hnh window. Cc option cng tng t nh trong nmap.

Demo
Kt hp nmap v wireshack phn tch gi tin

Demo

attacker s gi n zombie gi SYN/ACK v ch gi RST, attacker ghi nhn li IPID

Demo

attacker dng IP zombie (gi IP) gi packet SYN n target cn qut port. Nu target m port s gi tr li zombie SYN/ACK. Zombie nhn packet SYN/ACK ln 2 cng s tr li vi RST nhng gi tr IPID tng 1

Demo

attacker gi li SYN/ACK n zombie. Nu IPID tng ngha l port target m, cn khng ngha l trc zombie nhn RST t target->port ng

1.T packet 65 n 73 l qu trnh nmap kho st trc IPID ca zombie. Nmaps gi lin tc SYN/ACK v ch RST ghi li IPID. IPID tng.

hinh2

hinh3

T packet 77 n 84 Nmap gi lp Targer m port, n dng IP Targer th xem IPID c vn tip tc tng nu tr Target gi SYN/ACK.

hinh4

hinh5

hinh6

3.Packet 85,86 l kim tra li sau khi gi lp Targer m port. Nmap gi SYN/ACK. IPID lc ny l 5362

hinh7

4.Sau khi kim tra mi th hot ng tt, nmap bt u SYN Targer vi IP ca zombie: packet 88 n 90. Do m port nn Target tr li SYN/ACK cho zombie (packet 89), zombie tr li RST v IPID tng 5369 (packet 90)

hinh8

hinh9

5. Packet 91, 92 nmap kim tra li IPID: 5365 = kt lun port m.

You might also like