11 - Session Hijacking
Module 11 - Session Hijacking
OWASP Zed Attack Proxy (ZAP)
First set Victim’s Proxy settings to attacker’s IP and port 8080.
Open ZAP and enable Break Point and click green + to view break points
Go to settings -> local Proxies -> Change IP from localhost to network IP (in this case 10.10.10.16).
Browse from victim and view the request and responses on the attacker machine.
Evading IDS Firewalls and Honeypots
Snort - Intrusion Detection
ICMP Detection Rule
Open C:\Snort\rules\icmp-info.rules.
Type alert icmp $EXTERNAL_NET any -> $HOME_NET 10.10.10.12 (msg:"ICMP-INFO PING"; icode:0; itype:8; reference:arachnids,135; reference:cve,1999-0265; classtype:bad-unknown; sid:472; rev:7;) in Line 21.
Save the file.
Start Snort in IDS mode
Open cmd in C:Snort and Type snort -iX -A console -c C:\Snort\etc\snort.conf -l C:\Snort\log -K ascii | here X=1 , l is small L
Detection
Ping the snort machine and rules will be displayed in cmd
Nmap Evasion Techniques – Firewall Rule Bypass
Enable victim firewall. Create inbound rule and block connection from attacker IP.
Run different scans from attacker machine. Use Zombie scan to bypass firewall rule.
nmap -sI <Zombie IP><Target IP>
Metasploit – Firewall Bypass
Payload Setup
Listener Setup
Execute Exploit
Last updated