大三大三下学期网络攻防技术_广工网络攻防实验报告.docx
网络攻防技术实验报告学院.计算机学院专业一计算机科学与技术年级班别学号学生姓名指导教师成绩广东工业大学姓名协作者教师评定实验题一.WindOWS下常用的网络命令一、实验目的学习在Windows系统中进行网络配置、用pingipconfig/winipcfg命令工具来进行网络测试、使用trace”路由跟踪命令、使用netstat>arp>nsk>okup命令查看网络状态。本实验在于使学生更好地理解计算机网络设置的基本操作,掌握计算机网络配置的基本监测技术。二、实验内容和要求1、使用Ping工具测试本机TCP/IP协议的工作情况,记录下相关信息。2、使用IPCOnfig工具测试本机TCP/IP网络配置,记录下相关信息。3、使用netsh工具测试本机TCP/IP网络配置,记录下相关信息。4、使用TraCert工具测试本机到WWW所经过的路由数,记录下相关信息。5、使用NetStat工具,记录下相关信息。6、使用ArP工具,记录下相关信息。7、使用NS100kUP工具,记录下相关信息。三、实验结果C:UsersAdministrator>ping10.21.9.38-t-14 J =g=zHzb1zziizb(5=正来来来来来来来来来Ping 10.21.9.3810.21.9.38 的回10.21.9.38 的回10.21.9.38 的回10.21.9.38 的回10.21.9.38 的回10.21.9.38 的回10.21.9.38 的回10.21.9.38 的回10.21.9.38 的回丁 厂 222222222 与3=3=3=3=3=3=3=3=332节节节节节节节节节 有IxxxrfI子>、<、lsss 据lrolnln<1TTL=64TTL=64TTL=64TTL=64TTL=64TTL=64TTL=64TTL=64TTL=6410.21.9.38的Ping统计信息:4I丢失,0他丢失 最短=0ns,最长=1ms,平均=0nsControl-CaC:Usersdin istrator>2、使用IPCOnfig工具测试本机TCP/IP网络配置,记录下相关信息。国! s5S: C:Windowssystem32cmd.exeC: Use1*sXAdninxsti*atoi*>i.pconF igZa 11Hndows I P 配,百王机名. 主DNS后 节点强T WINS'SA73用.启用、:日 在匕口i以太网适配器本地连接:TA客:书启Pu- - -用 6后缀如止:DUIDRealtek PCle GBE Famxly Contvo Ilei* C0-3F-D5-4E-56-5Df e80: :4100:dale:98dc:34a2zl2<Mi&>10-21-9.37< 首选 )255.255.255.010.21.9.126425749300-01-00-01-1B-43-ED-E1-C0-3F-D5-4E-82-C2DNS服务器 -TCPIP 上的 NetBIOS202.116.128.1202.116.128.2已启用隧道:酉己器 isatap.<AEAEDB7A-8D9B-449E-A6D0-64A62B8DF6D2> :媒体已断开Mic*osoft ISATftP Adaptei* 00 00 00-00 00-00 00 E0 不隧道适配器 本地连接“ 3:,述理Cp动瞿疆皆用媒体已断开Microsoft Teredo Tunneling Adaptev 00-00-00-00-00-00-00-E0QB g理员:C:Windowssystem32cmd.exe - netshC: DsersM<dninist*ato>netsh netsh>Interf ace notch intekface>ip nctsh Interface ipv4>show address无cp1sH<t “DHIPb 网In SM否192.168.1.239192.168.1.0/24(施码255.255.255.>192.168.1.125625»“无线眄纭S授2”的配置DHCP2启用:InterfaceMetikIc:废oUMwareNetworkAdapterUMnotl,的配置DHC70启用:否IPjl:192.168.204.1子网前皴:192.168.204.0/24亮码255.255.255.0>InterfAceMetitIc:204、使用TraCert工具测试本机到WWW所经过的路由数,记录下相关信息。C:MJses'dninist*ato*>t*ace*通过最多30个跃点跟踪到fcer.a.sohu.con115.25.217.12J的品各由:X_*_请求超时。< 1毫秒<1毫秒172.16.255.5< 1量杪<1量杪10.0.4.21ns_1ts_222.200.119.250< 1毫秒<1毫秒222.200.252.971ts222.200.253.61ms202.112.19.22* 请求超时1ms101.4.116.3839ms101.4.117.3330ms101.4.112.3838ms101.4.117.3835ns101.4.112.138ms101.4.112.9* 请求起时。35ms115.25.217.12跟踪元成。./:MJsersXHdninistratoivnetstat-e席口统计节茗庆知 字单非包 包据接收的8819698261146198408000发送的5882112610022379006、使用ArP工具,记录下相关信息。:Users×dninist*ator>arp-a型态态态态态态态态态态态态态态态态态态态态态态态Internet地址物理地址10.21.9.1c4ca-d9-a8-cf-6c10.21.9.38c0-3f-d5-4e-84-bf10.21.9.39c0-3f-d5-4e-84-9e10.21.9.67c0-3f-d5-4e-9b-e410.21.9.71c0-3f-d5-4e-96-b310.21.9.99c0-3f-d5-4e-53-b810.21.9.103c0-3f-d5-4e-85-6710.21.9.255ff-ff-ff-ff-ff-ff224.0.0.201-00-5e-00-00-02224.0.0.2201-00-5e-00-00-16224.0.0.25201-00-5e-00-00-fc229.0.5.201-00-5e-00-05-02229.6.6.601-00-5e-06-06-06230.99.210.5801-00-5e-63-d2-3a230.201.133.21901-00-5e-49-85-db233.175.184.22201-00-5e-2f-b8-de234.206.44.18201-00-5e-4e-2c-b6235.43.140.18301-00-5e-2b-8c-b?235.213.242.4201-00-5e-55-f2-2a235.237.65.11301-00-5e-6d-41-71238.171.48.5901-00-5e-2b-30-3b239.192.0.801-00-5e-40-00-08239.255.255.25001-00-5e-7f-ff-fa接口:10.21.9.370×c7、使用NSk)OkUP工具,记录下相关信息。D:MJsersdninistrator>nslookupwww.baidu.con服务器:ddress:202.116.128.1非权威应答:DNSrequesttimedout.timeoutwas2seconds.名称:www.a.shifen.conAddresses:14.215.177.3714.215.177.38Aliases:wuv.baidu.co四、实验心得五、问题与讨论1. 如何测试你的主机到特定网址的连接是否有故障?如果有故障,如何进一步分析故障的原因?答:使用ping命令检测网络的连接情况,查看ip数据包经过的情况。2. 记录结果:T答:3. 你的主机的48位以太网地址(MAC地址)是多少?答:CO-3F-D5-4E-56-5D4. 尝试用Ping大包命令进行攻击(例如某台主机),记录攻击情况。IC:MJsersXfidministrator>ping10.21.9.38-tjj HZ1114m J =z=z=zz=l 正来来来来来来来来来Ping 10.21.9.3810.21.9.38 的回10.21.9.38 的回10.21.9.38 的回10.21.9.38 的向10.21.9.38 的回10.21.9.38 的回10.21.9.38 的国10.21.9.38 的向10.21.9.38 的回节 小 ccccxccccx 222222222 与3=3=3=3=3=33=33 32节节节节节节节节节 有H4HH子 具j-B -CEr-BS - B - 0.-CD、-B -OUV1 1 1 1 1 1 <<<<<<L=64TL=64L=64TL=64L=64TTL=64TL=64TTL=64TTL=6410往coAC.2返38包的=-C L 数*ropis ,/E统计信息:=2上掇收9,丢失,。物丢失,十毫秒瘴像: = 1ns,平均0nsMJsersXfldministrator>5.如何实施ARP欺骗?如何防范?ARP欺骗分为二种,一种是对路由器ARP表的欺骗;另种是对内网PC的网关欺骗。第种ARP欺骗的原理是截获网关数据。它通知路由器系列错误的内网MAC地址,并按照一定的频率不断进行,使真实的地址信息无法通过更新保存在路由器中,结果路由器的所有数据只能发送给错误的MAC地址,造成正常PC无法收到信息。第二种ARP欺骗的原理是一伪造网关。它的原理是建立假网关,让被它欺骗的PC向假网关发数据,而不是通过正常的路由器途径上网。在PC看来,就是上不了网了,“网络掉线了”。防范方法可以将MAC与IP地址的映射设置为静态广东工业大学实验题目二.WireShark抓包软件一、实验目的1 .掌握如何利用协议分析工具分析IP数据报报文格式,体会数据报发送、转发的过程。在学习的过程中可以直观地看到数据的具体传输过程。通过分析截获TCP报文首部信息,理解首部中的序号、确认号等字段是TCP可靠连接的基础。通过分析WireShark连接的三次握手建立和释放过程,理解TCP连接建立和释放机制。2 .利用WireShark(Ethereal)抓包。3 .对抓取到的包进行分析,通过分析巩固对EthenIetll封包、ARP分组及IP、ICMP数据包的认识。二、实验内容和要求1)学习协议分析工具Wireshark的基本使用方法;2)对抓到的任一个IP包,分析其IP包的起始地址与终止地址,以及对应的MAC帧的起始地址与终止地址,TTL的值、协议字段内容,并分析其意义。3)利用Wireshark监听ICMP包,分析ping程序和tracert程序的主要功能。对抓到的任一个ICMP包,分析其MAC帧、IP包、ICMP包间的相互关系。4)利用Wireshark监听arp包,分析arp请求包与应答包的内容。三、实验结果(1)学习协议分析工具WireShark的基本使用方法;P:ED管理员:命令提示符14.215.177.37的Ping统计信息:往返警狗漏通谑矛Mt,丢失=0M丢失>'最短-12ms,最长-14ms,平均-13msC:WINDOWSsusten32>自自自 FEErKfe. 一 1 -;'+=4一可Ping b 183.250.179.132 183.250.179.132 183.250.179.132 183.250.179.132.1回回回回 dJJm -日盲一日-日 C B B u B b 2 2 2 2 13 3 3 3 g - _一 = Ud节节节节 low葬183.250.179.132具有32字节的数据:24ms TTL51=23ms TTL=Sl=26ms TTL=Sl =23ns TTL510. 25翼曾取3.返舒E秒21 Z Pi=峪 瞿啜 2 S S 13已计3m 9.:估 2 17S包的.=4 .均譬平丢失=0 <0丢失,=24nsC:WINDOWSsystem32.搜狗拼音输入法全:选取网卡:HWiresharlcCaptureInterfaces-XDescriptionIPPacketsPackets/s00Microsoftfe80:a8a7:8a7a:6550:f3f35443 ®NeteaseUUTAP-Win32AdapterV9.8fe80:8475:470d:64d7:589a0 mRealtekEthernetControllerfe80:d00c:f685:9e45:3bc30 团NeteaseUUTAP-Win32AdapterV9.8fe80:3cde:f690:93c1:6dc0 mNeteaseUUTAP-Win32AdapterV9.8fe80:4004:48f3:26eb:208a0 Microsoftfe80:70be:2b0c:ad50:38c80DetailsDetailsQetaiISDetailsDetailsDetailsVHelpStartStopOptionsClose(2)对抓到的任一个IP包,分析其IP包的起始地址与终止地址,以及对应的MAC帧的起始地址与终止地址,TTL的值、协议字段内容,并分析其意义No.TimeSourceDestination>otocollengthInfo413119.186508<×192.1G8.199.139183.250.179.132ICMP74echo(pln)requestidoxooo.seq*i3i33S3lttl三64414119210433(×183.2S0.17S.132192.168.1”.139ICMP74Echo(PlnGreply1<H0x0001lseq-1313)S36lttl-514*6120.2030130C1S2.168.,99139183.250.179.132ICWP74echo(ping)request-OxOOOXfseq13233792lttl-64I“7120.2267490(183.2S0.179.132192.168.199.139ICMP74Echo(p19)replytdxlfseq>13233792tttl三51I419121.2187130(192.lS.199.13918325O"9.132ICMP74echo(Plg)request10X000l.Seq1333404.ttl64420121.245178(×1«3.250.17$.132ICMP74Ccho(ping)replyId-OxOOOl,seq-13334048fttl-51433122.25O145(×192.168.199.139183.250.179.132ICMP74Echo(pi9)request30x0001,seq>13434304vttl*644341222734030C183.2S0.179.132192.168.199.139ICMP74echo(p119)replyo三oxooo.seq*i3434304tttl三sOOOO OOlO 0020 0030 0040O 1 1 e 7 10 0 6 6 Ooode 3 4 0 6 62 O 5 C 53 Od 6 6 a O C b 4 2 0 4 6 61 6 O a 3 3 10 6 67 d 8 9 2 0 4 0 6 6 e C 4 8 1 e 3 8 6 64 0 3 7 7 d O b 6 7foilC C 6 7e 8 6 O 9 9f 8 7 6 3 9 of 8 b 3 O 6 615 08 00 45 00 a c7 8b b7 fa62 63 64 65 66 72 73 74 75 76.1*20.<M.ghijkimnwabcdefgE.abcdef opqrstuv hi源ip:BSW JJJY 4JQ4J(2 Header checksum: 0x39f8 correctSource: 192.168.199.139 (192.168.199.Destination: 183.250.179.132 (183.250.179.132) Source GeolP: unknown Destination GeoIP: unknown internet control Message ProtocolOOOO OOlO 0020 0030 0040.1*20. E.9.Labcdefghijklmn opqrstuv wabcdefg hi目标ip:Destination:183.250.179.132(183.250.179.132)SourceGeoIP:unknownDestinationGeoIP:unknown也internetControlMessageProtocolOOOO OOlO 0020 0030 0040O 11 e 710 0 6 6OOOdG3 4 0 6 62 Q 5 C 53 O d 6 6a Q C b 42 0 4 6 61 6 O a 33 10 6 67 d 8 9 20 4 0 6 6e C8 1e 3E6 64 037 7 d - 6 -8 7 3 3O C 6 75 8 2 21 a 6 7 foilC C 6 7e 8 6 O 99f 8 7 6 3 9 of 8 b 3 O 6 6O b 4 40 8 6 7.120.<M.ghi jkimn wabcdefgE.abcdef opqrstuv hi源Mac帧地址:IGbit: individualaddress (unicast)Source: 30: 10: b3: 9e: cf: 15 (30: 10: b3:9e: cf: 15)Address: 30:10:b3:9e:cf:15 (30:10:b3:9e:cf:15)O .Type: ip (0x0800)=LG bit: Globally unique address (factory defa =IG bit: Individual address (unicast)3 internet Protocol version 4, Src: 192.168.199.139 (192.168.199.139), Dst: 183.250.Ooooo 0 12 3 4 Ooooo4 0 3 7 7d Ob 6 76 O a 310 6 6a O Cb 42 0 4 6 640006d668 7 3 369 of 83 0 6 6b3Ob 4 40 8 6 7I 6 f 8O a 6 6of 6 7 1a* E 建 9L abcdef ghijklmn opqrstuv wabcdefg hi目标MAC帧地址:DeSLnaLOmd4:ee:07:31:24:3Z(d4:ee:07:31:2a:32)Address:d4:ee:07:31:2a:32(d4:ee:07:31:2a:32)O=LGblt:Globallyuniqueaddress(factorydefault)0=IGb11:individualaddress(unicast)EJSource:30:10:t>3:9e:cf:15¢30:IO:b3:9e:cf:15)Address:30:io:b3:9e:cf:15(30:io:t>3:9e:cf:15)O=LGb*i:GlobalIyuniqueaddress(factorydefault)0=IGbit:individualaddressCunicast)Type:IP(O×O8OO)InrernerProrocolversion4,Src:192.168.199.139¢192.168.199.139)tDs:183.250.179.13OOOO OOXO 0020 0030 0040Oood6 34066 B05 C5 0d66 Ocb4 EO4G6 Q6o a3 B1O66 3d 89 2 E4O66 3c481 g386 6 O37710066oil e7eso9 9f 8 7 63 9ofr8 b3OG6oa6G of 67 5 7 5 5 4b67Ob44 08678 7 33 O C67.Labcdefghi Jklmn opqrstuvwabcdeg hiTTL:Timetolive:64Protocol:ICMP(1)EJHeaderchecksum:0x39f8correctsource:192.168.199.139(192.168.199.139)Destination:183.250.179.132(183.250.179.132)SourceGeoiP:unknownDestinationGeoIP:unknownInternetControlMessageProtocolType:8(Echo(ping)request)Code:OOOOO OOlO 0020 00300040O 11 e 7 10 0 6 6 ood 6 3qo 6 62 O 5 C 53 Od 6 6 a O Cb 4 2 0 4 6 61 6 O a 33 1 O 6 G7 d 8 9 2 0 4 0 6 6 e C 4 8 1 e 3 8 6 64 0 3 7 7 d O b 6 7O a 6 6of 6 75 7 5 54 b 6 7Ob 4 40 8 6 78 7 3 3O C 6 75 8 2 21 a 6 7 foilC C 6 7e 8 6 O 99f 8 7 6 3 9 of 8 b 3 O 6 6.lis20. .<M.g. ghijkimn wabcdefE.abcdef opqrstuv hi协议字段内容:ProtoC01:ICMPHeaderchecksum:0x07dlcorrect(Good:True(Bad:FalseSource:183.2S0.179.132(183.2S0.179.132)Destination:192.1e8.199.139¢192.168.199.139)(SourceGeoIP:unknown4 8 66O a67 Soss4 C 678846474S 3 33Ob 672 a 223f 67a 7 11 2b 67 1X609 3d 87 67 7 Qf 8 oo<x66 e&l e7 eO6 64 3 Od 6 d 3 56 6 15dsc6s cfoo54曲64 e 9 O a 3 9 3 066 3 C 09 2 b 806 6OCg 用 1 1 3 8G 6O Q7 7 7 3<>C67 Qoooo 012 3 4 ooc8ggg(3)利用Wireshark监听ICMP包,分析ping程序和tracert程序的主要功能。对抓到的任一个ICMP包,分析其MAC帧、IP包、ICMP包间的相互关系。ICMP包:14M1222734OM0018325ai7M3219Z168.199.1J9ICMP74Ecto(ping)reply3=M001.seq=1湘<3MJ=51-OXF4J4:WtdOftWUe(592MtS)l745£(C<ti6d(512MtS)8ScynCe0二Etherfttutsrc:*:&:0;打:2纪乂(tfi:ee:o;:n:2a:32),ost:做如必如cf:IS(3O:io:M:e:cf:i5)JDetinaticr:JO:10:W:Se:cf:15(»:10:b3:9e:cf:U)9soiree:gee:8:认:“淑(Mee:3:3X:ZC32)Type:ip(OxOMO)InterrerProtxolWSW4,Src:10.250.17.132(18L2SO.119.1I2).Ost:192.1M.1M.139(192.161.199.139)version:4HeMeflength:20MeSDifferefltutedServicesField:MX(MCFoxm:IrtCmDSCP;ECM:to:wox-KT(hotKMapMkTrimport)Toullength:0XderttK1Cl0fl:88C39(35W7)SFl95:CUMFragwitoffset:0etolive:51protocol:x<mp(1)HealerCheCkSg0v>7correctsource:m.2.179.112(U3.250.179.X3?)Destination1½.1M.199.B9(192.M.199.139)(SourceGeoP:UrtcnownDestinitiQfiGCOmUrtCB>-2ntefretcontrolIIeS到eProtocolType:O(Echo(p119)reply)Code:OChecksui:054scorrectMeXIflef(tt):1(Qxi)Idecifier(IE):2Si(OxOlOO)2sCeMOef():w(Qiom)SequenceMber(LE):3U(M(OxSMO)'ResomstTo:433':Rcspc11xi三e:23.2Sp田0U(32Ttt)OXW (»10 8N SA OX)M3cttl蠡螂JPPing程序主要用于测试网络的联通性,tracert程序主要用于跟踪路由,测试与目的地址之间的跳数。MAC帧中有Type:IP(OXO800)指明了该数据帧是递交给它上层(网络层)的IP协议作进一步的处理。IP包中有PrOtoCO1:1CMP(I)指明了该包的协议是ICMP协议ICMP包中有Type:O(ECho(Ping)reply)表明了该包是个应答包,占了8个字节(4)利用WireShark监听arp包,分析arp请求包与应答包的内容。Arp请求包:U22856.185606(K)030:10:b3:9e:cf:15d4:ee07:31:2a:32ARP42Whohs192.168.199.1?Tell192.168.199.139-×IS)Frame228:42bytesonwire(336bits)t42bytescaptured¢336bits)oninterface0EthernetIIvSrc:30:10:b3:9e:cf:15(30:10:b3:9e:cf:1S),Ost:d4:ee:07:3i:2a:32(d4:ee:07:31:2a:32)EDestination:d4:ee:O7:3i:2a:32(d4:ee:O7:3i:2a:32)Address:d4:ee:07:31:2a:32(d4:ee:07:31:2a:32)0LGbit:Globallyuniqueaddress(factorydefault)0三XGbit:individualaddress(unicast)-Source:30:10:b3:9e:cf:15(30:10:b3:9e:cf:15)Address:3O:io:b3:9e:cf:15(3O:io:b3:9e:cf:15)0«LGbit:Globallyuniqueaddress(factorydefault)0IGbit:Individualaddress(unicast)ye:ap(O×O8O6)AddressResolutionProtocol(request)Hardwaretype:Ethernet(1)Protocoltype:IP(0×0800)Hardwaresize:6protocolsize:4Opcode:request(1)Sendermacaddress:30:10:b3:9e:cf:15(30:10:b3:9e:cf:15)senderIPaddress:192.1G8.199.139¢192.168.199.139)Tar9etmacaddress:d4:ee:07:3i:2a:32(d4:ee:07:31:2a:32)TargetIPAddress:192.1M.199.1(192.163.199.1)OOOOd4ee07312a323010b39CfIS08OGOOOl.l三20OOlO08000604H¾E113010b39eCfISCOa8C78b.B00020d4ee07312a32COasC7Ol.1*2.MAC发送地址:30:10:b3:9e:cf:15MAC目的地址:d4:ee:07:31:2a:32IP发送地址:192.168.199.137(主机的ip地址)IP目的地址:192.168.199.1(无线路由的ip地址)Arp应答包:U4381396.199484000d4:eeK)7:31:2a:3230:10:b3:9e:cf:15ARP42192.168.199.1isatd4:eeK)7:31:2a:32-×DFrame438X:42bytesonwire(336blcs)942t>cescaptured(336bits)oninterfaceEthernetIX1Src:d4:ee:07:31:2a:32(d4:ee:07:31:2a:32),Dst:3O:io:b3:9e:cf:1S(30:10:b3:9e:cf:IS)HDestination:30:10:b3:9e:cf:1S(30:10:b3:9e:cf:15)Address:30:10:b3:9e:cf:15(30:10:b3:9e:cf:IS)0-LGbait:Globallyuniqueaddress(factorydefault)0-IGbit:Individualaddress(unicast)QSource:d4:ee:07:31:2a:32(d4:ee:07:31:2a:32)Address:d4:ee:07:3i:za:32(d4:ee:07:3i:2a:32)0=LGbit:Globallyuniqueaddress(factorydefault)O三XGbit:individualaddress(unicast)Type:arp(0×080)SAddressResolutionProtocol(reply)Hardwaretype:Ethernet(1)Protocoltype:IP(0x0800)Hardwaresize:6Protocolsize:4Opcode:reply(2)sendermacaddress:d4:ee:07:31:2a:32(d4:ee:07:31:2:32)senderpaddress:1S2.168.199.1¢192.168.199.1)Targetmacaddress:30:10:t>3:9e:cf:1SC30:10:b3:se:cf:1S)TargetXPaddress:192.168.199.139¢192.168.199.139)MAC发送地址:d4:ee:07:31:2a:32MAC目的地址:30:10:b3:9e:cf:15IP发送地址:192.168.199.1(无线路由的ip地址)IP目的地址:192.168.199.137(主机的ip地址)四、思考题1 .利用W