You are on page 1of 6

CSE : Information Security

Management

ASSIGNMENT

K MARY NIKITHA 18BCE0457

LAB DA 1 Page 1 of 6



3
5
0
2

Portspoof
Installing portspoof

Step 1: Opening SSH service

LAB DA 1 Page 2 of 6


Step 2: Scanning with attacker machine (Windows)

Step 3: iptables -F
To see the current policy
iptables -L

LAB DA 1 Page 3 of 6



Step 4: Forwarding packets to portspoof in order to reply the client
machine

Step 5: Starting Potspoof in Verbose mode

LAB DA 1 Page 4 of 6


Step 6: Scanning from attacker machine (Windows)

Step 7: Using nmap with -v and -A options

LAB DA 1 Page 5 of 6


OUTPUT BY POSTPROOF:

LAB DA 1 Page 6 of 6

You might also like