Professional Documents
Culture Documents
Giới Thiệu Về Hping3 Tool
Giới Thiệu Về Hping3 Tool
-Tool:
Hping2 or Hping3 - OS: Linux -Dowload: http://www.hping.org -Ci t: - Trn linux: ubuntu, backtrack apt-get install hping - trn backtrack h tr hping khng cn ci - C th ci gi trc tip : hping-20051105.tar.gz
Ni dung
Gii thiu hping tool Cc la chn ngha dng lnh Hn ch Demo
TCP Ping (-S) UDP Ping (-2) Scan mode scan (-8)
Cc option
Kim tra ICMP Hping2 -1 target Traceroute s dng ICMP. Ging vi tracert trong windows v linux s dng cc gi icmp tng mi ln mt gi tr TTL ca n Hping2 traceroute V -1 target Traceroute xc nh cng xem ni gi tin ca bn b chn. Hping2 traceroute V S p 80 0daysecurity.com
Cc option
Kiu khc ca port scanning. Chng ta s th FIN scan. Trong kt ni TCP c FIN flag c s dng bt u mt kt ni thng xuyn. Nu chng ta khng nhn c tr li th cng m. Thngthng tng la s gi mt gi tin RST ACK bo hiu rng cng ng Hping2 -c 1 V p 80 F 0daysecurity.com ACK Scan. C th c s dng xem nu mt host cn sng (khi ping b chn). iu ny s gi phn hi RST tr li nu cng c m. Hping2 -c 1 V p 80 A 0daysecurity.com
Cc option
Xmas Scan: thit lp th t s 0 v thit lp URG + PSH + c FIN trong gi tin. Cng ng nu cc thit b mc tiu gi gi tin TCP RST. Cng m nu target loi b qut TCP Xmas, gi khng tr li. Hping2 c 1 V p 80 M 0 0daysecurity.com Null Scan: thit lp l 0, khng c c flag thit lp trong gi tin. Nu TCP port ng, thit b gi gi tin TCP RST reply. Nu TCP port m, mc tiu loi b qut TCP NULL , gi khng tr li. Hping2 -c 1 V p 80 Y 0daysecurity.com
len=46 ip=192.168.1.1 flags=RA DF seq=0 ttl=255 id=0 win=0 rtt=0.4 ms Len:Kch c, bng bytes ca data c c t data link layer Ip:a ch ip ngun Flags:The TCP flags: R for RESET, S for SYN, A for ACK, F for FIN, P for PUSH, U for URGENT DF:Nu s tr li bao hm c DF, IP Header c "don't fragment" c t seq :S lng gi thu c s dng ngun chuyn cho TCP/UDP packets hoc sequence field cho ICMP packet. Id:lnh vc IP ID Win:kch thc ca s TCP
Rtt:Thi gian kh hi tnh bng mili-giy Nu bn chy hping s dng "-V" +"dng lnh", n s trnh by v gi b xung. Chng hn: len=46 ip=192.168.1.1 flags=RA DF seq=0 ttl=255 id=0 win=0 rtt=0.4 ms tos=0 iplen=40 seq=0 ack=1223672061 sum=e61d urp=0 Tos:Kiu dch v trong IP Header Iplen:IP total len field seq and ack:S ni tip nhng s 32bit v s ghi nhn trong IP Header Sum:Tng kim tra IP Header urp:Gi tr khn cp trong TCP
Hn ch
Khng th dng c script pht hin im yu Khng c giao din cho h iu hnh window. Cc option cng tng t nh trong nmap.
Demo
Kt hp nmap v wireshack phn tch gi tin
Demo
Demo
attacker dng IP zombie (gi IP) gi packet SYN n target cn qut port. Nu target m port s gi tr li zombie SYN/ACK. Zombie nhn packet SYN/ACK ln 2 cng s tr li vi RST nhng gi tr IPID tng 1
Demo
attacker gi li SYN/ACK n zombie. Nu IPID tng ngha l port target m, cn khng ngha l trc zombie nhn RST t target->port ng
1.T packet 65 n 73 l qu trnh nmap kho st trc IPID ca zombie. Nmaps gi lin tc SYN/ACK v ch RST ghi li IPID. IPID tng.
hinh2
hinh3
T packet 77 n 84 Nmap gi lp Targer m port, n dng IP Targer th xem IPID c vn tip tc tng nu tr Target gi SYN/ACK.
hinh4
hinh5
hinh6
3.Packet 85,86 l kim tra li sau khi gi lp Targer m port. Nmap gi SYN/ACK. IPID lc ny l 5362
hinh7
4.Sau khi kim tra mi th hot ng tt, nmap bt u SYN Targer vi IP ca zombie: packet 88 n 90. Do m port nn Target tr li SYN/ACK cho zombie (packet 89), zombie tr li RST v IPID tng 5369 (packet 90)
hinh8
hinh9