###### tags: `finished` :::success # INR Lab 6 - Do Whatever You Want ::: **Notes: "You need to complete at least 2 task"** :::info **3. Monitoring:** Try to do traffic monitoring on one of the networking devices from your previous labs and try to monitor and save the traffic that is going from/to a VM, This is very important in case you will have to do some networking investigation. ::: For monitoring, I will use the topology from the modified second lab work. I think it's just the most interesting, if we talk about the interaction of services with the Internet. <center> ![](https://i.imgur.com/W6PeW9Y.png) Picture 1 - My topology </center> For example, this is the traffic received when connecting my workstation to a virtual machine via ssh: <center> ![](https://i.imgur.com/raR1JZw.jpg) Picture 2 - Traffic monitoring during SSH connection </center> And here we can observe an appeal from the outside to the web server: <center> ![](https://i.imgur.com/EMXoUvJ.jpg) Picture 3 - Monitoring traffic while connecting to a Web server ![](https://i.imgur.com/ydx6Jdp.jpg) Picture 4 - One of my favorite features is Follow TCP/HTTP Stream </center> After all the lab tests, Wireshark seems to be an incredibly cool tool that I usually use to check the operation of interfaces (whether a packet is lost or not), look at the hosts' responses to broadcast mailings, I can see who is root in STP and many other things. The only thing is, Wireshark shows the contents of only open packets, that is, in the case of SSH, I can see the connection between the devices (I see their exchange algorithms), the key exchange and what algorithm they used to connect, but I don't see the data being transmitted themselves. :::info **5. Packet Crafting:** Use one of the tools/libraries for crafingnetwork packets (for example, scapy) to investigate the vulnerabilities of your network in one of the previous labs. Try different library functionality in practice, for example, to: - what data can you intercept - what protocols can you modify - what devices can you scan - ~~what network attacks can you conduct~~ (DDoS at least) - what kind of load testing on communication channels can you implement - etc. depending on your aspirations ::: Well, let's use hping for crafting network packets! <center> ![](https://i.imgur.com/k58drgN.png) Picture 5 - Sent a package to router ![](https://i.imgur.com/w0LLJzl.png) Picture 6 - Sent packet to a specific port and get the answer </center> For easier mastering of the program, I returned to the version of the topology in which there were no Ipv6 and firewall settings yet, so if you set the port scanning range from 0 to 100, we will see the following: ``` sudo hping3 -8 0-100 -S 192.168.122.200 ``` <center> ![](https://i.imgur.com/czkfs8Z.png) Picture 7 - Port scanning </center> And here is an example of searching for a host among a given range of addresses, but using the random mechanism (alas, random did not choose the number 200 to detect my host :D - or is it still luck?) ``` sudo hping3 -1 192.168.122.x --rand-dest -I eth0 ``` <center> ![](https://i.imgur.com/NeG8Nny.png) Picture 8 - Host detection </center> Now let's intercept HTTP traffic from the Web server using the command: ``` sudo hping3 -9 HTTP -I eth0 ``` <center> ![](https://i.imgur.com/zVv3QcR.png) Picture 9 - Intercept all traffic containing HTTP signature </center> And this command, for example, checks the system for fault tolerance. Well, I think this will be the last picture in this task, because my system is unstable :,) ``` hping -i u1 -S -p 80 192.168.122.200 ``` <center> ![](https://i.imgur.com/41rdVVa.png) Picture 10 - Yes, this is the last picture, because after load 100% of memory, my system went into failure </center> :::info **6. Your Idea:** If you want to explorer an idea that you had and didn’t have time to check, you can do it here, if your idea is interesting, It will be counted as 2 tasks, Can be done in a team of 2. ::: I didn't have much time (which is true :D), and maybe this doesn't really apply to our course, but I wanted to share a thought that has interested me since I started preparing for admission to Innopolis (already six months?). In general, I like working with the data flow, because now, especially with the transition to distance education, the opening of many online courses is all author's content wrapped in a huge amount of traffic. And, to be honest, I haven't seen a single course yet whose lecture recordings would really be protected from downloading. This is a very interesting topic for me, because I have worked a lot with design and I know that on many photographers' websites images are not available for "theft" (with my level of knowledge, at least). But if we are talking about video clips, then fragmentation does not even save here either. **A funny example:** This is my friend's blog and he allowed me to use his video as an example. An illustrative example of monitoring the traffic of a web page (although to tell the truth I'm just digging into the logs) when clicking on a link from its video. I think the watermark idea is great, even when receiving the video itself, the author is still displayed on it, and that's cool. But if we are talking about hours-long videos and recordings of lectures, then I most often saw separated fragments there.ts, but there are still enough programs to build them sequentially. ![](https://i.imgur.com/x7It9hD.png) ![](https://i.imgur.com/IT0U2xs.jpg) ## References: 1.[Wiki hping](http://wiki.hping.org/) 2.[EH-Net/Articles](https://www.ethicalhacker.net/)