• Uncategorized 18.06.2019

    In this post i will be explaining what i learned on the second session of the ethical hacking class.  Target scoping and information gathering were the main topics of the day. Our objectives for the week were using web tools for footprinting, describing DNS zone transfers, and conducting competitive intelligence. And We were assigned to create another kali linux virtual machine so that we have 2 virtual machine, so that the other one could sniff the other one and retrieve the information.

    These are the steps and commands on what to do:

    By using the command line “Ifconfig” on the targeted VM By using the command line “# tcpdump -vvn -I eth0 src <ip address> -w <filename>.pcap” on the attacking VM By running these lines, We are getting records of the other virtual machine that is being sniffed Ifconfig Tcpdump command line “tcpdump -w eth0 host <ip> -w <filename>.pcap” Some examples on getting the records Result on pcap file which is opened by wireshark

     

    Posted by nixon @ 8:17 am

  • Leave a Reply

    Your email address will not be published. Required fields are marked *