Ethical Hacking and Penetration Testing Guide


Internal Network Attack Vectors



Yüklə 22,44 Mb.
Pdf görüntüsü
səhifə140/235
tarix07.08.2023
ölçüsü22,44 Mb.
#138846
1   ...   136   137   138   139   140   141   142   143   ...   235
Ethical Hacking and Penetration Testing Guide ( PDFDrive )

Internal Network Attack Vectors
Here are some of the attack vectors to use when you are on the same network as the target is:
Exploiting DNS Servers
—This is the easiest way by which you would compromise the DNS 
servers and manipulate DNS records.
ARP Spoofing
—This can be used to manipulate DNS records. We learned about it in the 
“Network Sniffing” chapter (Chapter 6).
DNS Spoofing
—Discussed in the “Network Sniffing” chapter (Chapter 6).
Faking an Access Point
—You can set up a fake wireless access point, as you are able to control 
the DNS; the client would trust all your settings. We will see all about this attack in the 
“Wireless Hacking” chapter (Chapter 11).


224
◾ 
Ethical Hacking and Penetration Testing Guide
External Network Attack Vectors
Exploiting DNS Servers
—Again, you manage to compromise the DNS server externally, so you 
can easily manipulate the records.
DNS Cache Poisoning
—DNS cache poisoning can be launched externally to manipulate DNS 
records. However, this attack is not that common nowadays and is a bit harder to pull off, 
since most of the DNS servers are patched against it.
Evilgrade Console
The Evilgrade console is pretty much the same as Cisco’s IOS console, with the same commands. 
Let’s take a look at some of the basic commands.
show
: Displays information about a particular object
conf
: Enters the configuration mode of a particular module
set

Yüklə 22,44 Mb.

Dostları ilə paylaş:
1   ...   136   137   138   139   140   141   142   143   ...   235




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin