Unicornscan

Unicornscan – Scan open available ports 
Unisc

This one state to use SYN packet which is also a default
unmT

Below this is scanning using UDP
unmU

Direct the output into text file. 
Making the text file (unicornscan -l file scantarget)
unl1

Writing the text file
unl2

Directory reappear – text file done.
unl4

The output will be inside the file instead of appearing on the next line in cmd
unl5

If you open the text file before it is finished(before the next line dir appears),
it will show nothing (blank) as if it is still processing… or simply empty.. but not.
unl3
Re open it will do.

 

Scan all ports with services,

une1

From all the 65536 ports..
une2

Showing both open and also closed.
une3

On a specified host (192.168.15.128).
une4

 

Portscan

Port

Port can be refer to an endpoint connection in a computer.

There are 65536 ports (0-65535):
-Well known ports (0-1023)
-Registered ports (1024-49151)
-Dynamic Private ports (49152-65535)

Port scanning – scanning available services of a stated host.

Some tools for port scan:
Nmap

This is an example of nmap in linux (vmware) ,
to ip of available host in windows (vmware) .
nmap1

This one to another available host
nmap2

Image below is ss of nmap to unavailable host
nmapa1

Check if its down or blocked
nmapa2

Nmap -h for more options

Nmap -O os scan
nmapos1
Zenmap 

Open zenmap gui from cmd
Zm cmd

Zenmap gui
Zm1

Several scanning type available
Zm2

Fill the “Target” box, choose scan type, and scan it.
Example of ping scan..
Zm pingsc
My target: 192.168.15.* which means it will scan from .0 to .255.
Ping scan will show result of responding host with each latency.

Another example, regular scan
Zm regsc

Linux cmd, ping, fping

Ping: Request an echo to an ip to get response.
Fping: Same as ping but its output is designed to be easy to parse.

More details about ping and fping, Source: http://www.miaoyisz.com/2013/01/27/difference-between-ping-and-fping/

Use ifconfig to check the ip in linux connection
linuxifconfig

Ping google(site)
linuxping

Fping is like ping but instead will reply with just simple sentences.
Try fping to any site or ip address like shown below.
Alive means responding.
linuxfpa
If not, it will wait 5 secs..
linuxfpu1
…and state that it is unreachable
linuxfpu2
Or if an address typed incorrectly/doesnt exist
linuxfpu3

Locate directory(same as in windows)
linuxloc
But in linux it is case sensitive(desktop instead of Desktop, d and D)
linuxcsensiloc

Fping using text file ( -f ).
linux-f

“iplist” text file contain 2 ip
linuxiplist

 

 

 

Fping in windows cmd

F stands for fast, fping is for fast pinging. It is most likely the same with normal cmd ping, but it can be simpler like by giving beep sound every time ping received (fping.exe site -b) or simply only one or end result (-o).

You can download fping.exe from the site provided below.
http://www.softpedia.com/get/Network-Tools/IP-Tools/Fping.shtml

Difference between ping and fping?
-Basically it is the same as normal ping, but in fping there are several unique options available.

Open your cmd
Locate the fping.exe location (I put it in my desktop)
Untitled

Try typing fping.exe on its location, it will show several options.
Untitled1

Basic use of fping
Untitled2

 

One of several options from fping, -g. Echo to a given range of ip checking for response.
fping -g

Kali Linux

I did installed kali linux on my VMware, didnt took time to do the steps, except the loading parts. I am about to share the steps by some screenshots that will be posted below.

Btw, I will skip some basic and default screenshot, because there is too many of them and not really needed.

First as u see, I will open my vmware (because I am installing it there)1
2

 

Some Basic setup will be asked like, choose the Linux ISO (in my case) location, version, and file name.
4

After that, some configuration are there, just press next and next which means, just leave it as is, as default / recommended. Then you are done.
14

Done installing kali linux, but here is a further install in the linux itself.
Click graphical install

15

Select language
16

 

Choose keyboard input
18

 

Network settings: not now.
19-20

Later, it will ask you for a new host/user name and then new password.
22

Loading, please wait. Dont forget to turn off your internet connection first to ensure faster installation without automatic update ( you can update it later if you want to).
29

 

Type in your username that you put before.
Untitled

Password
Untitledads

So, its all done, you have entered kali linux.
Untitled4

WireShark

Wireshark is a software used to analyze some network protocol. You can download it from wireshark.org (not mine). So basically it can analyze a certain network ip that you want to. Below are some steps to ping from wireshark in VMware to desktop.

Picture below is a screenshot of my installed wireshark. I opened wireshark from VMware.
WSstart

You can choose “Capture Options” to check the settings available. In my case, I skip it and leave it like that (default).

Next, when u click interface option, it will show devices and it’s ip to be captured.
WSint

Open the cmd and note the ip address of the device. Then, press start on the interface option. There will be details such as ip, source, destination.

Wsinint

 

And then press the ip on the cmd. In cmd will show the same in wireshark.
Wscmd

 

 

First Week

 

Why Ethical?

Today, I am going to talk about an introduction to a subject that I learn in my university, I am a computer student and currently learning some computer subjects including this subject called “Ethical Hacking”. If you as a student take computer forensics and security as the study program / stream, then only you can enroll this subject, not really sure maybe there are one or two more study program related to the subject. So, lets talk about the subject.

Basically we all know what hacking does, which can be described with words such as “break in” and it is a job to illegally access through a network security which means hacking is gaining access without any permission from the network’s owner. Moreover, other than just gaining access and also accessing into it, hackers can also get the file that he / she wants or you can say, stealing, because you get the file without permission and or even delete it from the original location. Hacking is a cyber crime, you can get penalized by doing it because it is also counted as criminal job and close to a thief in real life. In my university, they want us, the computer students, to solidly understand the concept of hacking and use it for a good and better purpose, so they named the subject with “Ethical” in front of the word “Hacking”.

There are of course, difference between hacking ethically and simply just hacking… Small differences, but big consequences. Well, if you read “Ethical” you will immediately understand something, a good way or a good manner and yes it is. Ethical hacking is hacking legally, on which you are an employee hired by a company to do penetration test and only allowed to do it to your own company’s network to detect or check weaknesses to prevent network being hacked by those cyber thief. Penetration testing is no different than hacking.. the only thing is, simply pentest is only to test the network’s protection. Giving reports and solutions to the owner is these tester’s job. Ethical hackers can be imagined as a police that prevent the thief to act or even caught them while they act. Law is the stuff that ethical hackers want to consider. Laws are slightly different on each every places, so it is best to read the law agreement each time you want to do something related to it. All of the above that i have wrote shows that ethical hacking is almost the opposite of the illegal hacking.


 

Lab work

In the lab session, installed vmware, vm – virtual machine.

In the vmware, you can create a new virtual machine by clicking the blue marked square.
vmw

 

 

Os – win xp

Winxp

 

Enable internet through right click and then to setting
Untitled

 

Need this nat adapter like this one
1

 

 

To do that, go click the button “Add” below those and choose “Network adapter”12

 

 

And choose “Nat”
3

 

Disable the windows firewall if needed, and.. internet connected.
BrowseXP