# 109 物聯網網路服務攻擊介紹與實務操作1 (09/30) ###### tags: `LZ` Kali Linux 無法複製、貼上 == ```shell # 安裝VM Tools apt-get install open-vm-tools-desktop # 重新啟動服務 systemctl restart vmware-tools ``` 虛擬機帳密 == ```shell Metasploitable2 account: msfadmin password: msfadmin Kali Linux account: root password: toor ``` 兩台網路都設定在NAT模式 ## Demo 1 1. Kali 開啟wireshark 2. Kali Wireshark 過濾 telnet 3. Kali Telnet連線至Metasploitable2 > telnet IP_Metasploitable2 4. Kali 透過telnet terminal在Metasploitable2 讀取/etc/passwd > cat /etc/passwd 5. Kali 看Wireshark 可以發現Telnet的明文資料 ## Demo 2 1. Kali 開 Wireshark 2. Kali wireshark 過濾 ssh 3. Kali 用SSH連線到Metasploitable2 >ssh msfadmin@IP_Metasploitable2 4. Kali 看wiresarhk並觀察封包內容 5. Kali 調整 python paramiko套件版本 >python -m pip install paramiko==2.0.8 6. Kali 調整 python paramiko套件版本 7. Kali 測試 CVE-2018-15473 >python /usr/share/exploitdb/exploits/linux/remote/45233.py --username test $IP_Metasploitable2 > >python /usr/share/exploitdb/exploits/linux/remote/45233.py --username service $IP_Metasploitable2 ## 練習一 1. Kali 更新套件包 >apt-get update -y;apt-get upgrade -y 2. Kali 安裝套件包 >apt-get install gsettings-desktop-schemas -y 3. Kali fix error > apt --fix-broken install 4. Kali 安裝套件包 > apt-get install -y mosquitto;apt-get install -y mosquitto-clients 5. Kali 啟動MQTT伺服器 > service mosquitto start 6. Kali 在本機的MQTT伺服器訂閱主題 **IoTClass/Test** > mosquitto_sub -h 127.0.0.1 -t IoTClass/Test 7. Kali 新開一個Terminal > ctrl+shift+t 8. Kali 發布資料到本機MQTT伺服器的主題 **IoTClass/Test** > mosquitto_pub -h 127.0.0.1 -t IoTClass/Test -m “I_Want_To_Tell_You_Something
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up