MACAddress: 00:0C:29:01:FA:F0 (VMware) Devicetype: general purpose Running: Microsoft Windows 7|2008|8.1 //操作系统检测 OSCPE: cpe:/o:microsoft:windows_7::- cpe:/o:microsoft:windows_7::sp1 cpe:/o:microsoft:windows_server_2008::sp1 cpe:/o:microsoft:windows_server_2008:r2 cpe:/o:microsoft:windows_8 cpe:/o:microsoft:windows_8.1 OSdetails: Microsoft Windows 7 SP0 - SP1, Windows Server 2008 SP1, Windows Server 2008 R2, Windows 8, or Windows 8.1 Update 1 NetworkDistance: 1 hop
OSdetection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmapdone: 1 IP address (1 host up) scanned in 2.74 seconds
PORTSTATE SERVICE VERSION 21/tcpopen ftp Microsoft ftpd 23/tcpopen telnet Microsoft Windows XP telnetd 25/tcpopen smtp Microsoft ESMTP 7.5.7601.17514 80/tcpopen http Microsoft IIS httpd 7.5 135/tcpopen msrpc Microsoft Windows RPC 139/tcpopen netbios-ssn Microsoft Windows netbios-ssn 445/tcpopen microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds 49152/tcpopen msrpc Microsoft Windows RPC 49153/tcpopen msrpc Microsoft Windows RPC 49154/tcpopen msrpc Microsoft Windows RPC 49155/tcpopen msrpc Microsoft Windows RPC 49156/tcpopen msrpc Microsoft Windows RPC 49157/tcpopen msrpc Microsoft Windows RPC 49158/tcpopen msrpc Microsoft Windows RPC 49159/tcpopen msrpc Microsoft Windows RPC 49160/tcpopen msrpc Microsoft Windows RPC MACAddress: 00:0C:29:01:FA:F0 (VMware) ServiceInfo: Host: WIN-5MQI51VLCDC; OSs: Windows, Windows XP, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows, cpe:/o:microsoft:windows_xp
Servicedetection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmapdone: 1 IP address (1 host up) scanned in 77.74 seconds
指定扫描端口
检查目标主机是否开放80,3389端口
1 2 3 4 5 6 7 8 9 10 11 12
┌──(root㉿kali)-[~] └─#nmap -sS -p 80,3389 192.168.10.142 //扫描主机的80及3389端口 StartingNmap 7.92 ( https://nmap.org ) at 2023-12-26 09:54 CST Nmapscan report for 192.168.10.142 Hostis up (0.00049s latency).
PORTSTATE SERVICE 80/tcpopen http 3389/tcpopen ms-wbt-server MACAddress: 00:0C:29:01:FA:F0 (VMware)
Nmapdone: 1 IP address (1 host up) scanned in 1.31 seconds
Core(warning): Certificate received from server is NOT trusted by this system, an exception has been added by the user to trust this specific certificate. Failedto initialize NLA, do you have correct Kerberos TGT initialized ? Doyou trust this certificate(yes/no)? yes //接受证书 Core(warning): Certificate received from server is NOT trusted by this system, an exception has been added by the user to trust this specific certificate. Connectionestablished using SSL.
防范暴力破解攻击
使用复杂的密码并定期更换
长度8位以上
包含小写字母、大写字母、符号、数字至少其中三种
不含有用户名
管理员账号禁用或改名
Administrator、root
启用账户锁定阈值
管理工具->本地安全策略
gpupdate /force
DoS与DDoS攻击
DoS攻击概述
DoS,拒绝服务 (Denialof Service)
通过各种手段,最终导致目标系统崩溃、失去响应
从而使目标系统不能为正常的用户提供资源或对应的功能(拒绝服务)
常见的DoS攻击方式
SYN Flood泛洪
PingFlood泛洪
UDPFlood泛洪
DoS攻击演示
hping3工具
可向目标主机发送任意TCP/IP协议数据包的一款开源的安全工具
也用于扫描/防火墙测试/路由追踪/协议分析等场景
常用选项
-p:指定目标端口
–syn:设置SYN标记 (-S)
–flood:泛洪,尽最快发送数据包,不显示回复
实验环境
攻击机:kali2022,使用hping3工具
靶机:win2008,开启3389远程桌面服务
场景演示
针对靶机的3389端口发起攻击,使其失去响应
1 2 3 4 5
┌──(root㉿kali)-[~] └─#hping3--syn --food -p 3389 192.168.10.142 //SYN包泛洪测试 HPING192.168.10.142(eth0 192.168.10.142):S set, 40 headers + 0 data bytes hpingin flood mode, no replies will be shown //需要停止时,按Ctrl+ C快捷键