# Networks. Практическая работа №4 Топология ![](https://i.imgur.com/DNxnlh4.png) Установим адресацию на машинах - Win-7 10.0.1.1/24 - Debian 10.0.1.2/24 - KALI-MITM 10.0.1.3/24, 10.0.1.5/24 - Kali-Linux 10.0.1.4/24 Debian ![](https://i.imgur.com/0yj9MiF.png) Kali Linux ![](https://i.imgur.com/vQ5JTlc.png) Kali MITM ![](https://i.imgur.com/0oSbHHw.png) Win-7 ![](https://i.imgur.com/SWhsgSi.png) Сконфигурируем SPAN для отправки трафика на Kali Linux ```bash= enable configure terminal monitor session 1 source interface e0/0 monitor session 1 source interface e0/1 monitor session 1 source interface e0/2 monitor session 1 destination interface e1/0 do write ``` Результат ![](https://i.imgur.com/54f3J9J.png) Запустим wireshark на SPAN интерфейсе. Видим что к нам попадает весь трафик. ![](https://i.imgur.com/QoTWGXI.png) NMAP Network scan ```bash= nmap -v -sn 10.0.1.0/24 ``` ![](https://i.imgur.com/ITYtzkT.png) OS Detection ```bash= nmap -O 10.0.1.2 ``` ![](https://i.imgur.com/ONWuGnK.png) ```bash= nmap -O 10.0.1.1 ``` ![](https://i.imgur.com/VcuGgdU.png) ```bash= nmap -O 10.0.1.5 ``` ![](https://i.imgur.com/iiWc9DX.png) ```bash= nmap -sS 10.0.1.1 10.0.1.2 10.0.13 10.0.1.5 ``` ![](https://i.imgur.com/Mr2R8Xr.png) ![](https://i.imgur.com/YIAekqW.png) Service detection ```bash= nmap -sV 10.0.1.1 10.0.1.2 10.0.13 10.0.1.5 ``` ![](https://i.imgur.com/0sQqYyA.png)