Lab 4 - Scan Beyond IDS and Firewall
Lab 4 - Scan Beyond IDS and Firewall
Lab Scenario
As a professional ethical hacker or a pen tester, the next step after discovering the OS of the
target IP address(es) is to perform network scanning without being detected by the network
security perimeters such as the firewall and IDS. IDSs and firewalls are efficient security
mechanisms; however, they still have some security limitations. You may be required to launch
attacks to exploit these limitations using various IDS/firewall evasion techniques such as packet
fragmentation, source routing, IP address spoofing, etc. Scanning beyond the IDS and firewall
allows you to evaluate the target network’s IDS and firewall security.
Lab Objectives
= Scan beyond IDS/firewall using various evasion techniques
= Create custom packets using Colasoft Packet Builder to scan beyond the IDS/firewall
= Create custom UDP and TCP packets using Hping3 to scan beyond the IDS/firewall
= Browse anonymously using Proxy Switcher
= Browse anonymously using CyberGhost VPN
Lab Environment
To carry out this lab, you need:
Lab Duration
Time: 40 Minutes
CEH Lab Manual Page 282 Ethical Hacking and Countermeasures Copyright © by E6-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
= Packet Fragmentation: Send fragmented probe packets to the intended target, which
re-assembles it after receiving all the fragments
= Source Routing: Specifies the routing path for the malformed packet to reach the
intended target
= Source Port Manipulation: Manipulate the actual source port with the common source
port to evade IDS/firewall
= IP Address Decoy: Generate or manually specify IP addresses of the decoys so that the
IDS/firewall cannot determine the actual IP address
= Proxy Servers: Use a chain of proxy servers to hide the actual source of a scan and
evade certain IDS/firewall restrictions
= Anonymizers: Use anonymizers that allow them to bypass Internet censors and evade
certain IDS and firewall rules
Lab Tasks
Task 1: Scan beyond IDS/Firewall using Various Evasion Techniques
Nmap offers many features to help understand complex networks with enabled security
mechanisms and supports mechanisms for bypassing poorly implemented defenses. Using
Nmap, various techniques can be implemented, which can bypass the IDS/firewall security
mechanisms.
Here, we will use Nmap to evade IDS/firewall using various techniques such as packet
fragmentation, source port manipulation, MTU, and IP address decoy.
1. Turn on the Windows 11 and Parrot Security virtual machines.
CEH Lab Manual Page 283 Ethical Hacking and Countermeasures Copyright © by E6-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
2. Switch to the Windows 11 virtual machine. By default, Admin user profile is selected,
type Pa$$woOrd in the Password field and press Enter to login.
Note: If Welcome to Windows wizard appears, click Continue and in Sign in with
Microsoft wizard, click Cancel.
Note: Networks screen appears, click Yes to allow your PC to be discoverable by other
PCs and devices on the network.
3. Navigate to Control Panel > System and Security > Windows Defender Firewall >
Turn Windows Defender Firewall on or off, enable Windows Defender Firewall and click
OK, as shown in the screenshot.
Pr Canteriae serge
ControlPanel » System and Secunty » Windows Defender Firewall > Customize Settings
ox
mob
OS CB 8 =
2 ae
CEH Lab Manual Page 284 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module 03 - Scanning Networks
4. Minimize the Control Panel window, click Search icon ( [9] on the Desktop. Type
wireshark in the search field, the Wireshark appears in the results, click Open to launch
it.
2 wireshark!
Best match,
a y |
Search the web Wireshark
wireshark portable
Pin to Start
wireshark tutorial avareaiae
0
5. The Wireshark Network Analyzer window appears, Start capturing packets by double-
clicking the available ethernet or interface (here, Ethernet).
Note: If Software Update window appears, click Remind me later.
org
ts fher: (Nemes asus ie =) erfoes shown
Ethemet iL zs
‘Adapter
for loopback traffic capture A
CEH Lab Manual Page 285 Ethical Hacking and Countermeasures Copyright © by E6-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
12. In the terminal window, type nmap -f [Target IP Address], (here, the target machine is
Windows 11 [10.10.1.11]) and press Enter.
Note: -f switch is used to split the IP packet into tiny fragment packets.
Note: Packet fragmentation refers to the splitting of a probe packet into several smaller
packets (fragments) while sending it to a network. When these packets reach a host,
IDSs and firewalls behind the host generally queue all of them and process them one by
one. However, since this method of processing involves greater CPU consumption as
well as network resources, the configuration of most of IDSs makes it skip fragmented
packets during port scans.
13. Although Windows Defender Firewall is turned on in the target system (here, Windows
11), you can still obtain the results displaying all open TCP ports along with the name of
services running on the ports, as shown in the screenshot.
CEH Lab Manual Page 286 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module 03 - Scanning Networks
ll
7 https://nmap.org 6 60:42 EDT
Nmap scan report for 10.16,1.11
st is up
(no- response
/tcp open http
cp open msrp
139/tcp open netbios
445/tcp open microsoft-ds
tcp open ms-wbt-server
78:89:75:64 (Unknown
anned in
14. Switch to the Windows 11 virtual machine (target machine). You can observe the
fragmented packets captured by the Wireshark, as shown in the screenshot.
Pr Gaptiing
fom Eonar en aee se |
Fie Edt View Go Copture Telephony Tools Heh
.
. +
fo. te aah Ife
Doan 477-7203 0 37190 > 5548 [SIN Seq WntD4 Len HSSA60
offa0, TDaffed) [Ress
4569 off-s, 10-ffed) [Ress
8374 477.274549 60 37799 + 1687 SYN] Seq-0 Hin=1626 Leno 15-1460
60 Frageented , Reassenb
62 Frapeented
t 660 37799 + 27352 [SM] Seg-O Win-1024 Lend MSS-I460
Frageented
granted
. 60 37799 » Boi [SYN] SeG-0 Win-1624 Lene Ms5=1460
. Fragrented Tl
&: 3.
P8383 477.179032
*
be
« proto
BE s3e9 477 60 37799 + 32704 [Sv] Seqro Mine1024 Lenwe MiSe14s0 q
. 69 Frageented IF ) oFf0, I T
&: ff28, 1D
pe 69 37799 + b04e [svi] Searo lineie2¢ Léneo rssei4e8
* 6, off-0, 10-7006; eno
8 6, off=B, 10-7006) (Reas en
Ph 230s 477.283016 win1024 Leno nSs=2460
466 PG, offal
184667 10.0.1 of Fa
998 477.18406719.19.1.33 0 37799 = 3007 [Sm] Seave Win-ie26 Lenve rsseiseo
Frame 1: 42 bytes on wire (336 ide
01 be bs 7
be Oa és
[OZ crenes sve copsren pegs» 0915 (00.059)
Packet: 8415 Deployed Prof tall
15. Switch to the Parrot Security virtual machine.
16. In the Parrot Terminal window, type nmap -g 80 [Target IP Address], (here, target IP
address is 10.10.1.11) and press Enter.
CEH Lab Manual Page 287 Ethical Hacking and Countermeasures Copyright © by E6-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
Note: In this command, you can use the -g or --source-port option to perform source
port manipulation.
Note: Source port manipulation refers to manipulating actual port numbers with
common port numbers to evade IDS/firewall: this is useful when the firewall is
configured to allow packets from well-known ports like HTTP, DNS, FTP, etc.
17. The results appear, displaying all open TCP ports along with the name of services
running on the ports, as shown in the screenshot.
18. Switch to the Windows 11 virtual machine (target machine). In the Wireshark window,
scroll-down and you can observe the TCP packets indicating that the port number 80 is
used to scan other ports of the target host, as shown in the screenshot.
PGi Femenonet me ences |
Fie Edt View Go Copture Analyze Stat
age RE ee
a 3 -)+
CEH Lab Manual Page 288 Ethical Hacking and Countermeasures Copyright © by E6-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module 03 - Scanning Networks
Note: Using MTU, smaller packets are transmitted instead of sending one complete
packet at a time. This technique evades the filtering and detection mechanism enabled
in the target machine.
21. Switch to the virtual Windows 11 machine (target machine). In the Wireshark window,
scroll-down and you can observe the fragmented packets having maximum length as 8
bytes, as shown in the screenshot.
hone wy
Wireless
aaan
69 Frageent ed IP pr
60 Frageent ed TP pi
60 s1625 + 981 [SYM] Segue Wine1024 Lenee NsS~1450
160 Fragrent ed IP protocol. ( (CP 6, off=B, 108271) [Reassen
60 Frageent ed TP protocal (prota=TCP 6, off=8,
Pp azsst 787.050250 69 51625 + 765 [Sv] Segre Win-1828 Len-@ Hss=1460
12932 767.052081 60 Fragrent ed IP protocol (proto-TCP 6, off-0,
2933 787.05206 60 Fragrent ed TP protocol ( de
Pp 32034 7a7.052083 60 51623 + ‘3404 [Syn] Segre hine1024 Lenea Msse1468
60 Frogrent ed IP protocol ( 6, off-0, [D=e0d3) [Reassend
60 Frageent ed IP protocol (proto=TCP 6, off=8, Reessemb
12937 787.053894 60 51625 + 4079 [SYN] Seq-@ Win=1e24 Leri-® MSS=2468 4
race \Device\Wr_{33i 31-41CB-942F-ODSE4MEEEED), id @
0 75 64 08 eG cOCL oH
| [@ 7 CRAcxeret: <ive apture capazenn roopoorese> Packets: 16558 -Dplayed: 16558 (100. oe |
CEH Lab Manual Page 289 Ethical Hacking and Countermeasures Copyright © by E€-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module 03 - Scanning Networks
Note: In this command, -D: performs a decoy scan and RND: generates random and
non-reserved IP addresses (here, 10).
24. Now, switch to the Windows 11 virtual machine (target machine). In the Wireshark
window, scroll-down and you can observe the packets displaying the multiple IP
addresses in the source section, as shown in the screenshot.
[Ging tometer Ty
opty Hel
o+
g Time Source Protocel Length Info 4
33099 990.661910 185.19.247.103 rer (60 61352 + 4224 [SYN] SeqeO Win=1024 Lemad NS5=1460
33188 990.683764 165.105.92.39 13 (69 61352 = 4224 [SYN] SeqrO Win=1824 Len=@ MSS=1460
35101 998.685967 167.36.247.98 TP {69 61352 + 4224 [SYN] Seqr@ Win=1424 Lennd MSS~1468
33102 990.688358 160.172.87.100 18 {60 61352 + 4224 [SYN] Seq-O Win-1824 Lend HS5~1468
33203 990.696783223.115.213.62 rer {60 61354 + 61532 [SYN] Sequ0 Win=1026 Lense NSS=1460
23104 990,593539 123.65.236.151 18 {60 61354 + 61532 [sii] Seqro Wine1024 Leno PSS~1460
33195 990.696100 142.242.127.101 ia {69 61354 + 61532 [SYN] Seq-0 Win-1024 Len-9 NSS-146@
33496 990.698630 72.126.234.74 re 460 61954 ~ 61592 [SYW] SequO Hin=1024 Lenae NSS=1468
33187 998.70@895 10.10.1.13, 13 ‘69 61354 + 61532 [SYN] Seq-@ Win=1024 LenB MSS=1468
33188 990,705238 _76.162.90.239 1 60 61354 + 61552 [57H] Seq-d Min-1026 Len=o 15-1450
33109 990.705475 194.146.205.28 re3 (60 61354 + 61532 [SYN] SeqeO Wine1028 Lens MSS=1460
35110 990.787309 185.19.267.103 10° (60 61354 + 61552 [SMU] SeqrO Win=1024 Leno NSS=14060
33111 990.709129 165.105.92.39 rer {60 61354 + 61532 [SiN] Seq-@ Win-1024 Len-@ MSS~1460
33112 990.710968 167.36.247.90 rep Lad henson Bepentocn prpteaaispa aid hasnt
33113 990.712772160.172.87.108 ree 469 61354 + 62532 [SY] Seq-@ Win=1024 Len-9 MSS=146e
35114 99¢.715152_223.115.213.62 ree 160 61354 + 1248 [SYN] Seq-O Winel824 Lenm@ HS5~1460
33115 990.717135 123.65.236.181 1 (60 61354 + 1248 [SYN] Seqe® Winel074 Lenad MS5~1460
33416 990,720512 142.242.127.101 ep (60 61354 = 1245 [SYM] Seq-O Min=1024 Lenco HSS=1469 a
33117 990.725437 72.116.254.74 re (60 61354 + 1245 [SYN] Seq~O Win-1026 Len-@ Ms5~1460 q
33118 990.725396 10.10.4.13, 1 160 61354 + 1248 [SYN] Sequ Win=1824 Lend MSS~1460
33119 990.727211 76.162.90.239 Te 60 61354 + 1248 [SYN] Seqe@ Min=lO24 Lense Hs5=1468
35126 990.729156 194.146.205.28 13 (60 61354 + 1248 [sy] Seqre ine1e24 Leno rs5~146e
33121 990.731033185.19.247.103 1e 160 61354 + 1248 [SYN] Seq-O Win-1024 Len-@ #55~1460
33122 990.733033165.105.92.39 1.3 60 61354 = 1248 [SYN] SeqeO Min=1024 Lena@ HS5=1460
33123 990,734952 1.8 {69 61354 + 1248 [SYN] Seqro Winel92¢ Lena NSS~1468
33124 990. 736856 1 {60 61354 + 1248 [SYN] Seq-@ Win-1824 Len-@ NSS~1460
33125 990. 738725 re 169 61954 > 6547 [SYN] Seqe@ Winal824 Lene MSS=1460
33126 990.740638 re3° (60 61354 + 6547 [Sm] Seqre Win=1824 Lenne MS5=1460 4
ia Address Resolut tocol (nr |
CEH Lab Manual Page 290 Ethical Hacking and Countermeasures Copyright © by E6-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
Not showr
>ORT
microsoft
ms -wbt
5:64 (Unknown)
poof-mac 9
http 97 81:08 EDT
C address AD:22:£0:B0 o registered vendor)
specified some options that require ket access
These options will not be honored for TCP Connect scan
for 10.10.1.11
s latency)
tered tcp ports (no-response
msrpe
tcp. open netbio
tcp ope
9/tcp r
CEH Lab Manual Page 291 Ethical Hacking and Countermeasures Copyright © by E6-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
27. Switch to the Windows 11 virtual machine (target machine). In the Wireshark window,
scroll-down and you can observe the captured TCP, as shown in the screenshot.
53897 1550.553984 z 55 [TCP Keep-Alive] 50185 ~ 443 [ACK] Seq=2409 Ack=7394 Win=26214..
55898 1550.673290 65 [TCP Keep-Alive ACK] 443 = S018 [ACK] Seqr7394 Ack=2410 Win-S..
53899 1550. 768316 i 55 [TCP Keep-Alive] $0189 + 443 [ACK] Seq~9854 Ack-7188 Win-26242..
53908 1550.945198 52.178. 10.1. 66 [TCP Keep-Alive ACK] 443 = 50109 [ACK] Seq=7108 Ack=9855 Win=5..
{880F8368-6131-41C8-342F-DDSBAMEESED), id ©
Address Resolution Protocol (request)
Oo ef di 43 id
(08 00 06 08
) 8 dl 481d
28. This concludes the demonstration of evading IDS and firewall using various evasion
techniques in Nmap.
29. Close all open windows and document all the acquired information.
Colasoft Packet Builder is a tool that allows you to create custom network packets to assess
network security. You can also select a TCP packet from the provided templates and change the
parameters in the decoder editor, hexadecimal editor, or ASCII editor to create a packet. In
addition to building packets, the Colasoft Packet Builder supports saving packets to packet files
and sending packets to the network.
Here, we will use the Colasoft Packet Builder tool to create custom TCP packets to scan the
target host by bypassing the IDS/firewall.
1. Turn on the Windows Server 2019 virtual machine.
2. In the Windows Server 2019 virtual machine, click Ctrl+Alt+Del to activate the machine.
By default, Administrator user profile is selected, type PaS$wOrd in the Password field
and press Enter to login.
CEH Lab Manual Page 292 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
Note: Networks screen appears, click Yes to allow your PC to be discoverable by other
PCs and devices on the network.
Administrator
fevseseed |
Administrator
Jason
Martin
Shiela
3. Click Search icon [2] on the Desktop. Type wireshark in the search field, the
Wireshark appears in the results, click Wireshark to launch it.
= oOo 6 Filters
Best match
Wireshark.
CEH Lab Manual Page 293 Ethical Hacking and Countermeasures Copyright © by E6-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
4. The Wireshark Network Analyzer main window appears; double-click the available
ethernet or interface (here, Ethernet) to start the packet capture.
Note: If a Software Update pop-up appears click on Remind me later.
Wvncrr mc
File Est V Analyze Statistics Telephony Wireless Tools Help
3)
Welcometo Wireshark
Capture
vara
te er: ( =) frac hoon
LocalAr
Loca
ke
5. Minimize the Wireshark window, click Search icon [o} on the Desktop. Type
colasoft in the search field, the Colasoft Packet Builder 2.0 appears in the results, click
Colasoft Packet Builder 2.0 to launch it.
Filters
Best match
Colasoft Packet Builder 2.0
Desktop app
P colasoft|
CEH Lab Manual Page 294 Ethical Hacking and Countermeasures Copyright © by E6-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
6. The Colasoft Packet Builder GUI appears; click on the Adapter icon, as shown in the
screenshot.
Note: If a pop-up appears, close the window.
Colasoh Packet Builder
File Edit Send Help
sce lee See: Me Se Hz 2. Colasoft
RT ape
No.| Delta Select
» default adapter for sending packet
7. When the Select Adapter window appears, check the Adapter settings and click OK.
8. To add or create a packet, click the Add icon in the Menu bar.
Colasoh Packet Builder
File Edit Send Help
@ Al @ € @
brport seit chee Adapter |About@ CY’Colason Cansa
AD Packet Atafiter
B Dede eo
CEH Lab Manual Page 295 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module
03 - Scanning Networks
9. In the Add Packet dialog box, select the ARP Packet template, set Delta Time as 0.1
seconds, and click OK.
Add Packet
10. You can view the added packets list on the right-hand side of the window, under Packet
List.
Polaron Pack Bulder
Bile Edit Send Help
oe @ i ¢@¢\b ¢il\@#.s 2» @
Import Exporty Add Insert Copy Send Send All Adapter | About
Decode Editor [Packet
No. | + (iGplpaekaise
S¥" Packetbe Infe No.] Delta Time| Source , Destination
@ Packet Length
@P capture Length
[Mj deita Tine
©-@ Ethernet - 11
MY Destination Address FRIFFIFFLEFLERIFR (0/81
MB source Address 20:00:00:00:00:08 [5/5]
P Protocol Type
<P Haranare Type
@P Protocol Type
@ Hardware Size
@ Protocol Size
FP Opcode
WB Sender Hardnare Adress
Sender Ip
A Target Har
@ Tarset Ip
©-@ Extra Data
imber of bytes
11. Colasoft Packet Builder allows you to edit the decoding information in the two editors,
Decode Editor and Hex Editor, located in the left pane of the window.
= The Decode Editor section allows you to edit the packet decoding information by
double-clicking the item that you wish to decode.
CEH Lab Manual Page 296 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
= Hex Editor displays the actual packet contents in raw hexadecimal value on the left
and its ASCII equivalent on the right.
Calazoh Packet Builder
File Edit Send Help
@ @ €¢ @\H ¢ oe © @ @ Sy’ Colasoft Gansa
Import Export Add Insert | Copy P Checksum Send Send All Adapter About Packet Anaifter
(Facet. (PRRDelta Time | Source
@ Packet Length Decode
@ capture Length 60 Editor
[i oeite Tine @.108000000 Second
(6/181
|W) destination Address FRIFRSFE FFF [0/6]
“MD Source Address 20:20:00: 26 t6/6]
Protocol Type x06 12/2)
© Address Resolution Protocol 134/28)
Peraware Type 1 (Ethernet) [14/2
BP Protocol Type ex8e0 (17 4) [16/21
Hardware Size [18/1]
@ Protocol Size 19/1)
P opcode [20/21
MB Sender Harcnare Adress (22/8)
1 Sender Ip Adress
ip Terget Hardware Adress 00:00:00: 22:00 [32/6]
9 Target Ip Adress 0.6.0.8 [38/4]
© Extra Data (42/18)
[B)lunber of bytes 18 bytes [42/18]
© ECS - Frame check Sequence
@ Fes ex6FECI760 (Calculated!
CEH Lab Manual Page 297 ical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
13. In the Send Selected Packets window, select the Burst Mode (no delay between
packets) option, and then click Start.
CEH Lab Manual Page 298 Ethical Hacking and Countermeasures Copyright © by EC-Cot
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
15. Now, when this ARP packet is broadcasted in the network, the active machines receive
the packet, and a few start responding with an ARP reply. To evaluate which machine is
responding to the ARP packet, you need to observe packets captured by the Wireshark
tool.
16. In the Wireshark window, click on the Filter field, type arp and press Enter. The ARP
packets will be displayed, as shown in the screenshot.
Note: Here, the host machine (10.10.1.19) is broadcasting ARP packets, prompting the
target machines to reply to the message.
File Edit View Go Capture Analyze Statistics Telephony Wireless Tools Help
Auae REQessetFssaaagwr
[aro
Time Source Destination Frotocal Length Info
15 4.608526 MS-LB-PhysServer=2. MS-NLB-PhysServer-20 ARP “42 bho has 10.20.22? Tell 26.
16 4.609449 MS-HLB-PhysServer-2.. MS-NLB-PhysServer-2~ ARP 42 10.10.1.2 15:5¢:
75 45,707985 _MS-LA-PhysServer-2.. Broadcast ARP
130 68.607723 _MS-NLB-PhysServer-2. MS-NLB-PhysServer-2. ARP
231 68.608136 _MS-NLB-PhysServer-2. MS-NLB-PhysServer-2_ ARP
194 106.744468 _MS-NLB-PhysServer-2.. Broadcast ARP
254 132.603262 _NS-NLB-PhysServer-2.. MS-NLB-PhysServer-2. ARP
255 132.603835 _NS-NLB-PhysServer-2. MS-NLB-PhysServer-2. ARP 42 10.10.1.2 is
391 166.776743 _NS-NLB-PhysServer-2. Broadcast ARP 42 ho has 10.10.2.
842 226.746653 _NS-NLB-PhysServer-2.. Broadcast ARP 42 tho has 10.10.1.2? Tell 10.10
884 237.117878 _MS-NLB-PhysServer-2. MS-NLB-PhysServer-2. ARP 42 tho has 10.10.1.2? Tell 10.10
885 237.119356 _MS-NLB-PhysServer-2.. MS-NLB-PhysServer-2. ARP 42 10.10.1.2 is at 02:15:50"
952 286.774322 _HS-HLB-PhysServer-2.. Broadcast ARP 42 tho has 10.10,1.2? Tell 10.10
1008 306.613797 _HS-NLB-PhysServer-2. MS-NLB-PhysServer-2_ ARP 42 tho has 10.10.1.2? Tell 10.10
1001 396.614127 _HS-NLB-PhysServer-2.. NS-NLB-PhysServer-2— ARP 42 10.10.1.2 is at 02:15:5d=
3061 346.815153 _MS-HLB-PhysServer-2.. Broadcast ARP 42 bho has 10.10.1.2? Tell 10.10.
1234 496.780909 _MS-HLB-PhysServer-2.. Broadcast ARP 42 who has 10.10,1.2? Tell 10.10
1512 453.104891 _HS-NLB-PhysServer-2. MS-NLB-PhysServer-2. ARP 42 who has 10.10.1.2? Tell 10.10
41313 453.105589 _HS-NLB-PhysServer-2. MS-NLB-PhysServer-2_ ARP 42 10.10.1.2 is at 02:15:54:
> Frame 15: 42 bytes on wire (336 bits), 42 bytes captured (336 bits) on interface \Device\NPF_{86268803-87F7-4808-BAI7-FFCOF7ESIFC2}, id @
> Ethernet IT, Src: MS-NLB-PhysServer-21 5d:19:1b:3f (@2:15:5d:19:1b:3#), Dst: MS-NLB-PhysServer-21 5d:19:1b:3d (@2:15:5d:19:1b:34)
> Address Resolution Protocol (request)
08 00 06 04 09 @1 62 15 Sd 19 1b 3f Ga Ga o1 13
@2 15 5d 19 1b 3d Ga Oa 01 02
17. Switch back to the Colasoft Packet Builder window, to export the packet, click Export >
Selected Packets....
Colasoft Packet Builder
File Edit Send Help
#ilee ¢ |e © @ |@ ®ColasoftCansa
Import | Export~|| Add insert Copy Checksum] Send Send All Adapter | About C5 Packet Arialier
ect |) RC
No.| Delta Time | Source Destination
Packet Length
Capture Length
Destination Address
MB source Address
P Protocol Type
Phardware Type
@P Protocol Type
@ Hardware Size
CEH Lab Manual Page 299 Ethical Hacking and Countermeasures Copyright © by EC-Cot
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
18. In the Save As window, select a destination folder in the Save in field, specify File name
and Save as type, and click Save.
| es) r 7
File Edt Send Help
@ #@#\¢@ @\a * ¢\|#
Send Send2 All Adapter
ww» |@
Import Export Add insert | Copy Ps:te Delete Checksum| | About
[le decode Ector No. | 1 | [igi paeket Lat
Packet Pa [Selected| 1
6-¥" Packet Info @ saveas x Destination
22. Close all open windows and document all the acquired information.
23. Turn off the Windows Server 2019 virtual machine.
Task 3: Create Custom UDP and TCP Packets using Hping3 to Scan
beyond the IDS/Firewall
Hping3 is a scriptable program that uses the TCL language, whereby packets can be received
and sent via a binary or string representation describing the packets.
Here, we will use Hping3 to create custom UDP and TCP packets to evade the IDS/firewall in the
target network.
CEH Lab Manual Page 300 Ethical Hacking and Countermeasures Copyright © by E6-Council
All Rights Reserved. Reproduction is Strictly Prohibit
Module 03 - Scanning Networks
Note: Before beginning this task, ensure that the Windows Defender Firewall in the Windows
11 machine is enabled.
1. Switch to the Windows 11 virtual machine.
2. Click Search icon [2], on the Desktop. Type wireshark in the search field, the
Wireshark appears in the results, click Open to launch it.
2D wireshark
Best match
Apps Wireshark
App
A Wireshark-win64
-3.6.3.exe
Search the web loge
© wireshark - see web results un as administrator
pen fle location
© Wireshark
Pinto start
a Pin to taskbar
wireshark oui Uninstall
wireshark tutorial
wireshark filters
GOord@oszes
3. The Wireshark Network Analyzer window appears, double-click the available ethernet
or interface (here, Ethernet) to start the packet capture.
Note: If a Software Update pop-up appears click on Remind me later.
ing
th her: (Enero er
Ethemet aS
Adapterfor loopback traffic capture —__
CEH Lab Manual Page 301 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
Note: Here, --udp specifies sending the UDP packets to the target host, --rand-source
enables the random source mode and --data specifies the packet body size.
Note: The MAC addresses might differ when you perform this task.
10. Switch to the Windows 11 virtual machine and observe the random UDP packets
captured by Wireshark.
Note: You can double-click any UDP packet and observe the detail.
11. Expand the Data node in the Packet Details pane and observe the size of Data and its
Length (the length is the same as the size of the packet body that we specified in Hping3
command, i.e., 500).
CEH Lab Manual Page 302 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module 03 - Scanning Networks
4
File Edit View Go Capture Analyze Statistics Telephony Wireless Tools Help
= aaak
a
Source Destnation Protacal Length Info
2490. 496.200032 10.10.1.11 20.191.46.109 T° 54 50071 > 443 [ACK 00 Ac 262656 Le!
2490. 496.422619 174.36.120.199 10.10.1.11 oe 542 1367 + @ Len-500
2490... 497.423047 234.23, 240.15 10.10.1.11 we 542 1368 + @ Len-500
2490.. 498.422774 154.3.0.137 10,10.1.11 we 542 1369 = @ Len-s00
2490.. 499.423218 224.25.77.178 30.10.1.11 ue 542 1370 + @ Len=s00
2490.. 499.866871 fe50::1:1 #f02::1 ICMPvé 110 Router Advertisement from @2:15:5d:13:1d:7e
2490. 499.8775 #80: :deb2:9b3b:549... f¥02: 16 TCHPVE _—99 Multicast Listener Report Message v2
2490.. 499.879255 #80: :596a:Sdce:bi:.. #¥02::16 TOWPvE 120 Multicast Listener Report Message v2
2490.. 500.237421 fe80::deb2:9b3b:549. #¥02::16 TOIPVG 99 Multicast Listener Report Message v2
2490. 500.423366 118.55.174.68 19.10.1.11 ue 542 1371 + @ Len-500
2490.. 500.429189 MS-NLB-PhysServer-2.. Mcrosof_01:60:00 ARP 42 who has 10.10,1.11? Tell 10.10.1.13
2490. 500.429203 Hicrosof_01:80:00 _HS-NLB-PhysSever-2_ ARP 42 10.10.1.11 is at 00:15:54 00
2490,. 500.843331 fe80::596a:9dcerb1:.. #F02::16 TcHPvé 119 Multicast Listener Report Message v2
2490.. 501.422905 | 122.82.144,149 10,10.1.11 we 542 1372 + @ Len=500
2490. 502.423317 143.27.228.55 30.10.1.11 uve 542 1373 + @ Len-s00
2490. 503.423391 102.143.174.106 10.10.1.12 woe 542 1374 + @ Len=500
249. 504.423379 129.0.209.38 10.10.1.11 we 542 1375 > @ Len=500
2490.. 505.423264 240.143.99.152 10.10.1.11 we 542 1376 + @ Len500
2490.. 506.423337 137.83.144.120 10.10.1.11 we 542 137 = @ Len-seo
2490. 507.423380 10.232.35.158 10.10.1.11 oe 542 1378 + @ Len=500 I
2490. 508.414214 _ 10.10.1.14 224.0.0.251 NOUS __418 Standard query response @x0000 TXT, cache flush PTR _adb._tep..
[> Frane 249042; 542 bytes on wire (4336 bits), 542 bytes captured (4336 bits) on interface \Device wPF_(s8063588-F693-a023-098e-occzaADEIi14), if
Ethecnet II, See: MS-NLB-PhysServer-21, 5d:13:1d:61 (@2:15:5d:13:1d:81), Dst: Mlcrosof_01:80:00 (00:15:5d:01:80:00)
Internet Protocol Version 4, Src: 102.143.174.106, Dst: 10.10.1.11
User Datagram Protocol, Src Port: 1374, Dst Port: @
Rata (500 bytes)
Data: Sasasasesssasasasesasasasesesasasesesesasssesesessseseseses
[Length: 500]
@@ 15 Sd @1 80 00 2 15 5d 13 1d 6108004500] JE
@2 10 €5 ce 00 00 40 11 73 00 66 af ae 6a Oa Ga Fj |
@1 0b 05 Se 00 09 O1 fc 90 43 585858585858 -* -COKKOK
Y Ethernet: <ive capture
n progress> Packets: 249204 Displayed: 248204 (100.0%) Profile: Default
Goe@ouwead BF % sear © il
12. Switch to the Parrot Security virtual machine. In the Parrot Terminal window, first press
Control+C and type hping3 -S [Target IP Address] -p 80 -c 5 (here, target IP address is
10.10.1.11), and then press Enter.
Note: Here, -S specifies the TCP SYN request on the target machine, -p specifies
assigning the port to send the traffic, and -c is the count of the packets sent to the
target machine.
13. In the result, it is indicated that five packets were sent and received through port 80.
CEH Lab Manual Page 303 Ethical Hacking and Countermeasures Copyright © by E6-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
14. Switch to the target machine (i.e., Windows 11) and observe the TCP packets captured
via Wireshark.
|fer rca —
Bile Edit View Go Capture Analyze Statistics Telephony Wireless Tool Help
| ade REQeeeZPTaseaaa
Tne Source Destination Protocol Length Info
TcP 54 1874 RST a
2501. 691.282378 10.10.1.13 10.10.1.11 54 1875 + 88 [SYN] Seq=d Win=512
2501. 691,282437 _10.10.1.11 10.10.1.13 cP 58 80 + 1875 (SYM, ACK] Seq=0 Aci sin=65392 Len=@ NSS=1450
‘2501. 692.283556 10.10.1.13, 10.10.1.11 Te 54 1876 = 80 [SYN] Seq=O Win=512 Le
2501. 692.263660 _10.10.1.11 cP 58 80 + 1676 [SVM, ACK] SeqnO Acke1 Wins65392 Lenad MSS=1460
2501. 693.284367 10.10.1.13 10.10.1.12 54 1877 + 80 [SYN] Seq=@ Win=512 Len=0
2501. 693.284476 _10.10.1.11 10.10.1.13 rcp 58 80 + 1877 [SYN ACK] Seq=0 Acke1 Win=65392_Len=0 MSS=1460
2501. 694,284416 10.10.1.13 10.10.1.12 Ter 54 1878 > 80 [SYN] Seq=0 Win-512 Len=0
2501. 694.264523_10.10.1.11 10.10.1.13 cP 58 80 + 1878 [SYN, ACK] Seq=0 Acke1 Wins65392 Lena MSS=1460
2501. 695,104921 Nicrosof_01:80:00 NS-NLB-PhysServer-2.. ARP 42 Who has 10.10.1.13? Tell 10.10.1.12
2501 695.106724 jcrosef_@1:80:00 ARP 42 10.10.1.13 is at 02:15:5d:13:1:81
2501. 695.502002, Microsof 01:80:00 ARP 42 Who has [email protected]? Tell 10.10.1.13
2501. 695.502019 Microsof_@1:80:00 _MS-NLB-PhysServer-2. ARP 42 10.10.1.11 is at 00:15:5d:01:80:00
2501. 698.002239 fe80::1:1 Ffo2::1 TCNPVE 110 Router Advertisement from 02:15:5d:13:14:7e
2501. 698.012020 fe80::596a:9dce:bi:.. F¥02 ICMPvS 110 Multicast Listener Report Mes age v2
2501. 698.013163 fe80::deb2:9b3b:549.. F¥02 TOPYE 90 fulticast Listener Report Mes age v2 i
2501 698.152593 fe80::1:1 #F02::16 TCHPvS _90 Multicast Listener Report Hessage v2
Frame 250173: 54 bytes on wire (432 bits), 5 bytes captured (432 bits) on interface \Device\NPF_{5A9B3588-F693-4023-B9B6-DCC29AD81114}, id @ |
hernet II, Src: MS-NLB-PhysServer-21,5d:13:1d:81 (@2:15:5d:13:1d:61), Dst: Microsof_@1:80:00 (00:15:5d:01:80:00)
> Internet Protocol Version 4, Sre: 1 2.1.13, Dst: 10.
@0 15 5d 01 80 00 0 15 Sd 131d 8100004500] ]€
20 28 00 00 40 00 40 06 24 a5 02 G2 C1 0d G2 oa (8.8: $ j
@1 0 07 52 G8 50 3c 2c 73 ba 00 00 00 00 50.04 RPL, 5 P
[O 7% etemet: ve capture
n pogess> Packets: 250444 Diplayed: 250444 (100.0%) || Profle: Defaul]
ke
15. Switch to the Parrot Security virtual machine and try to flood the target machine (here,
Windows 11) with TCP packets.
16. In the Parrot Terminal window, type hping3 [Target IP Address] --flood (here, target IP
address is 10.10.1.11) and press Enter.
Note: --flood: performs the TCP flooding.
17. Once you flood traffic to the target machine, it will respond in the hping3 terminal.
18. Switch to the Windows 11 (target machine) and stop the packet capture in the
Wireshark window after a while by click Stop Capturing Packets icon in the toolbar.
19. Observe the Wireshark window, which displays the TCP packet flooding from the host
machine. The attacker employs TCP SYN flooding technique to perform a DoS attack on
the target.
CEH Lab Manual Page 304 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
Note: You can double-click the TCP packet stream to observe the TCP packet
information.
ae
file Edt View Go Coptue Analyze Satistcs Telephony Wireless Tools Help
ECOUERE QeeeFareaaang
[aooiy a delay ter _ <Cuiy
Tine Protocol Length
1636. 886.573432 1010.1. 10.2. 3 © [<tlone>] Seqn140782326 Wine512 Len=o
1636.. 885.573433 10.10.1. . 13 © [<llone>] Seqn731031585 Wine512 Leno
1636. 885.57343210.10.1. 1. © [aione>] Seqn361491443 Wine5i2 Leno
1636. 886,573435 10.10.1. 1. © [<tlone>] Sequ237846215 Wine512 Len=0
1636.. 885.573435 10.10.1. 10.10.1.11 13 © [clone>] Seqr3380595987 Wine512 Leneo
1636. 686.573440 10,10.1. 10.10,1.11 1. @ [clone>] Seqr3652552106 Wine512 Leneo
1636. 856.573461 10.10.1. 30.10.1.11 rep @ [<tlone>] Seq=4042540798 Win=512 Len-0
1636. 886.573448 10.10.1.. 30.10.1.11 re? @ [<llone>] Seqn464668074 Wine512 Len=0
1636. 886.573447 10.10.1. 30.10.1.11 3 © [<tione>] Seqn692367079 Wine5i2 Leno
1636. 886.573448 1010.1. 30.20.1.11 rep © [clone>] Seqn458505587 Wine512 Len=0
1636. 886.573449 10.10.1. 20.10,1.11 cP 54 4829 > @ [<lione>] Seqn2650925648 Wine512 Len=0
1636. 886.573448 10. 30.10.1.11 cP 54 4832 + @ [clone>] Seq-2497054562 Win-512 Len-0
+1636... 886.573451 10, 10.1.13 10.10.3.11 1.8 ‘54 4833 + @ [<one>] Sequs14se2897 Wine5i2 Len=@
1636. 886.573455 10.10.1.13 30.10.1.11 cP 54 4828 + @ [<Nlone>] Seqn459949943 Win=512 Len=o
1636. 886.573463 10.10.1313 30.10.1.11 cP 54 4834 + @ [<llone>] Seqr3544162732 Wine512 Len=d
1636. 886.573852 10.10.1.13, 30.10.1.11 rer 54 4336 + @ [<lone>] Seqn3787292763 Wine512 Len-@
1636. 886.573852 10.10.1.13 30,10.2.1 rep 54 4835 > @ [<llone>] Seqn473293480 Win=512 Len=O
1636. 886.573853 10.10.1.13, 30.10.1.11 rep 54 4839 > @ [<Nlone>] Seqn1771317137 Win512 Len=o
1636. 886.57385310.10.1.13 20.10.1.11 rer 54 4837 + @ [<Hlone>] Seqr223622606 Win-512 Len-0
1636.. 886.573852 10.10.1.13 30,10.1.11 rer 54 4841 = @ [<Hlone>] Seqn451956971 Win-512 Len-O
1636.. 886.573852__10.10.1.13 30.16,1.12 ree 54 4849 + @ [<lone>] Seq=3907195365 Win=S12 Len=o
Frame 1636825: 54 bytes on wire (432 bits), 54 bytes captured (432 bits) on interface \Device\NPF_{5A983588-F693-4023-6986-DCC29ADB1114}, id
Ethernet II, Src: MS-NUB-PhysServer-21_5d: 81 (02:15: 1d:81), Dst: Microsof_01:80:08 (00:15:
Internet Protocol Version 4, Src: 10.10.1.13, Dst: [email protected]
20. The TCP packet stream displays the complete information of TCP packets such as the
source and destination of the captured packet, source port, destination port, etc.
"emer
(Mk Wireshark»
Packet 1636825 Ethemet a x
1636. 886.5 > Frame 1636825: 54 bytes on wire (432 bits), 54 bytes captured (432 bits) on interface \Device\NPF_{SA983508-F6)
1636. 886. > Ethernet IZ, Sec: M5-WLB-PhysServer-21, 5d:13:1d:81 (@2:15:5d:13:1d:81), Dst: Microsof_@1:60:00 (00:15:5d:01:29]
1636. 886.5 > Internet Protocol Version 4, Src: 10.10.
1636. 886.5
1636. 886. Source Port: 4833
1636.. 886. Destination Port: @
anes aoe
1636. 886. [Stream index: 2282]
1636. 886. [conversation completeness: Incomplete (@)]
1636. 886. [TCP Segment Len: 0]
1636. 886. Sequence Number: 418502697 (relative sequence number)
i636. 86. Sequence Number (raw): 799490118
si ext Sequence Number: 414502897 (relative sequence nunber)]
11636... 686.
‘1630. oie Acknowledgnent number (raw): 137554872
ee Header Length: 20 bytes (5)
1636. 886.
11636. 686.5 [Celeulated window size: 512)
[iindow size scaling factor: -1 (unknown)]
Checksum: @x2100 [unverified]
= [checksum Status: Unverified]
Frame 16368, Urgent Pointer: @ Deiii4}, id
Ethernet IZ, | > [Tinestanps]
Internet |
[e008 00 15 5d or Go 00 2 15 Sd 13 id &i 08 00 [oo
80 28 dd2 46el
1 01 000 6800 402F 06a7 4087 46Se Ga08 0a32 01eb b8Od Ga50 0200
0 15
@e1 00 28 de.
605) 1 Ob 12 e1 00 00 3 a7 40.46 08 32.cb OB 5008 GaP
CEH Lab Manual Page 305 Ethical Hacking and Countermeasures Copyright © by E6-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
21. Turn off the Windows Firewall in the Windows 11 by navigating to Control Panel >
System and Security > Windows Defender Firewall > Turn Windows Defender
Firewall on or off.
22. This concludes the demonstration of evading the IDS and firewall using various evasion
techniques in Hping3.
23. You can also use other packet crafting tools such as NetScanTools Pro
(https://www.netscantools.com), Colasoft packet builder (https://www.colasoft.com),
etc. to build custom packets to evade security mechanisms.
24. Close all open windows and document all the acquired information.
25. Turn off the Parrot Security virtual machine.
< > ~ 4% BB« CEH-Tools » CEH-Tools » CEHv12 Module03 Scanning Networks > Proxy Tools > Proxy Switcher v
CEH Lab Manual Page 306 Ethical Hacking and Countermeasures Copyright © by E6-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module
03 - Scanning Networks
2. Follow the installation steps to install Proxy Switcher using all default settings.
3. Once the installation is complete, uncheck all options in the final step of the wizard, and
click Finish.
CEH Lab Manual Page 307 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
Swe]
Bookmarks >
History >
Downloads Ctrl+J
Passwords
Print... Ctrl+P
Zoom - 10% + #
Help >
Exit Ctrl+Shift+Q
ke al
CEH Lab Manual Page 308 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module
03 - Scanning Networks
6. In the Settings wizard, scroll down to the end of the page and click Settings... under the
Network Settings section.
B setings x) ele:
@ Firefox aboutpreferences
& General
@ Home Browsing
Q search Gi Use autoscroling
& Security
A Privacy @ Use smooth scrolling
Q sync
show a touch keyboard when necessary
Always use the cursor keys to navigate within pages
More rom Mozilla Search or tet when you stat ying
@& Enable picture-in-picture video controls Learn more.
i Control media via keyboard, headset, or virtual interface Leam more
Recommend extensions as you browse Leain more
Gi Recommend features as you browse Learn more
Network Settings
© Firefox Support
7. The Connection Settings window appears; under the Configure Proxy Access to the Internet
section, ensure that the Use system proxy settings radio button is selected. Click OK and
close the Firefox browser window.
Connection Settings x
O soxxs v
Automatic proxy configuration URL
No proxy for
CEH Lab Manual Page 309 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module
03 - Scanning Networks
8. Click Searchicon ( (9), on the Desktop. Type proxyswitcher in the search field,
the ProxySwitcher Standard appears in the result, click open to launch it.
2 proxyswitc
Best match
| a ProxySwitcher
a switcher Standard
Standari Mie
we
Folders
ProxySwitcherStandard - in
Downloads
ProxySwitcherStandard - in
Downloads
12:00 AM
FY) sy2022 D
CEH Lab Manual Page 310 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
11. The Please Register window appears; click the Start 15 Day Trial button to proceed.
Piease Reaver
12. The Common Tasks Wizard window appears; under Welcome to the Proxy Switcher, click
Next.
reconnect
File Edit Actions View Help
7. BX|GO0| 8) G87)5\ 97 A
Response
CEH Lab Manual Page 311 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
13. Ensure that the Find New Server, Rescan Servers, Recheck Dead radio button is selected
under the Common Tasks section, and click Finish.
BE racy sotcner Unregreed Ore Commectony
7 ex GOSGE7 5 #4
Prony Scanner ‘state Response
Using tis wizard you can ack complete common proxy Ist
managment tasks.
(ck Fish to contre,
Comenan Tate
(© Fr New Servers, Rescan Servers, Recheck Dead
Fr 100 New Prony Servers
(OF New Prony Severs Located ina Spectic Courtny
CEH Lab Manual Page 312 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
14. Proxy Switcher window appears, showing a list of proxy servers in the right pane, as shown
in the following screenshot.
Gb pF Aso | ator| x
State Response
pa! Testing 1360im
103.2521.197 3128 Testing 208m
oF 103.25245.1602019 Testing 21000me
i 198.235 02078282 Testing 22531
Note: The list of proxy servers might vary in your lab environment.
(CEH Lab Manual Page 313 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
15. Observe the sea bar below the server section; once it is completed, click the Download
Proxy Lists icon ( ) to download the proxy list.
16. Wait until all the proxy servers are downloaded. This can take a significant amount of time.
CEH Lab Manual Page 314 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module
03 - Scanning Networks
17. If you have enough downloaded proxy servers, you can click the Stop Download &) icon to
cancel the download.
fx Proxy Satcher Unegutered [Direct Conmecton)
Fle Edit Actions View Help
7 FX GO| SSS 7) S| 9 7 Au v |pcromn |x
IB Proxy Scanner Server ‘State ‘Response ‘Country ‘Uptime Last Tested Last Updated
15 1 New (96) of 91.239.181.1904153 Untested ‘mm POLAND < minute
B CORE ® (i 99.216522174153 Untested (Ril SERBIA AND MONTENEGRO <inute
1S
nest
High Anonymous(0)
Bite
|etonerasiom
oS 98.248.2.1605678
oF 84268.197:9593,
eed
Untested
Untested
Fa(Ses UNITED
Serer STATES
(Turkey
wo wowreneseo aa
<< minute
<minute
IP ( Dead 202) oS 746.138.3608 Untestes (Rl SERBIA AND MONTENEGRO minute
Pemanerty(71) | 7060230834116 Untested (fim UNITED STATES: ecaiel
1 Basic Anonymty68) SF 62.112
194 224-26057 Untested < minute
(© Ne$SL (111) oS 41:128-72625678 Untested < minute
Be Private 95) 9 37208.1202558540 Untested minute
(B Dangerous 215) 369553.1855678 Untested < minute
@ My Proxy Servers) | 5 36 9236.42.4153 Untested inte
|B PronySwtcher(0) oS 3692198515678 Untested minute
(oS 202,188.49 14238172
Smuiasm Untested
end Toeeraz
PEOPLES DeNOCRATC REPUB < minute
ae
of 2014362654145 Untested < minute
ie 201.251.155 249-5678 Untested SS ARGENTINA < minute
2007197100 Untested < minute
(sf 200.27.110.2957702 Untested < minute
of 193.158.12:138-4153 Untested < minute
of 190.181.140905673 Untested < minute
of 199.195.175.93:5673 Untested minute
oS 108.165. 254 122:12328 Untested < minute
9 1958299 425673 Untested < minute
1 195.199.196.13:1080 Untested < minute
of 182.2336.824153 Untested < minute
of 182.16.171.6551459 Untested < minute
Sw 274153 Untested < minute
sg 180,180.12.51:4145 Untested <minute
vere
‘Core Proxy Network,
sate ogee cx
‘Complete ey
wor avepeony com Complete Es
weew cyberayndrome net Complete TL
wow antime com Complete [coe
User-Defined Lists ‘Complete Sees
‘Spysme Complete —————
SocksSlist. com Complete Picea |
reesn Sows
GatherProxy com Complete a
Complete fexomanennaal
Complete EE
‘Complete a
CEH Lab Manual Page 315 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
18. Click the Basic Anonymity folder in the left-hand pane to display a list of alive proxy servers,
as shown in the screenshot.
CEH Lab Manual Page 316 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
19. Select one proxy server IP address in the right- ane. To switch to the selected proxy
server, click the Switch to Selected Proxy Server ( ) icon.
20. When the proxy server is connected, it will show the connection icon as be)
Note: The proxy selected in this lab might vary in your lab environment.
Nn SSL (101)
Dangerous 217)
21. Launch the Mozilla Firefox web browser and enter the URL
http://www.proxyswitcher.com/check.php to check the selected proxy-server
connectivity. If the connection is successful, the following information is displayed in the
browser:
Note: The information displayed above may differ in your lab environment.
x) +
O B proxyswitcher.com/checkphp
DETECTED
107.174.121.140
UNITED STATES |
(CEH Lab Manual Page 317 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
22. If the connection is unsuccessful, try selecting another proxy from Proxy Switcher, and
repeat Step 19.
23. To ensure that the proxy is assigned, open a new tab and_ browse
https://www.google.com/. In the search field, type What is my ip and press Enter.
24. If About this page webpage appears, check I’m not a robot checkbox and verify the
CAPTCHA by selecting images as per the given guidelines.
. The proxy IP address is displayed, which infers that the legitimate address is masked, and the
proxy is in use.
Detecting your location. XG whatiemyip-PenelusuranGe X - oo x
€ c 08 ,google.com/search?q=what +ismy +ip8source=hp&ei= MgHZYinzitbDatsPo6OK6AWAfISIg=AJIKO: UF @ =
‘What's my IP
107.174.121.140
Your public IP address
CEH Lab Manual Page 318 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
26. Open a new tab in your web browser and surf anonymously using this proxy.
Detecting your locstion.. XG whatismy ip-Penelusuran Go x // Certfied Hacker
c oa ccertifiedhacker.com
certifiedhacker.com
a T mn s
HOME ABOUT PORTFOLIO BLOG CONTACT
SNE How
Sting toCrestea
Patch Wie Sth +
pen]
27. This concludes the demonstration of anonymously surfing the Internet using Proxy Switcher.
28. Close all open windows and document all the acquired information.
29. Navigate to Control Panel > Programs > Programs and Features and uninstall the Proxy
Switcher application.
CEH Lab Manual Page 319 Ethical Hacking and Countermeasures Copyright © by E6-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
CyberGhost
VPN
@® new * Oo g@ e w View oe
& Downloads #
Documents #
WR Pictures #
Music
ik Litem. Litem selected 119KB State: [(# Shared
CEH Lab Manual Page 320 Ethical Hacking and Countermeasures Copyright © by E6-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
Windows Security
Would you like to install this device software?
Name: TAP-Windows Provider V9 Network adapters
ea) Publisher: OpenVPN Technologies, Inc.
5. Inthe Your privacy is our goal pop-up, click Agree and continue.
6. Once the installation is complete, the CyberGhost8 window appears, click on Click here
to create one link to create an account.
ber Ghost 8
Log In
Log in with the CyberGhost username and
password you received via email with your order
confirmation, or create a new account.
&
yo)
CEH Lab Manual Page 321 Ethical Hacking and Countermeasures Copyright © by E6-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
7. Create an account using your personal details and click on Sign Up.
CyberGhost 8
Create account
Create your account to activate your one-tap data
protection!
@gmail.com
CEH Lab Manual Page 322 Ethical Hacking and Countermeasures Copyright © by E6-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
8. You will receive an activation email on your personal email. Open the email and click on
Activate Trial to start your trial version of CyberGhost.
P<]
Confirmation required
o CyberGhost
Hey Ghostie,
CEH Lab Manual Page 323 Ethical Hacking and Countermeasures Copyright © by E6-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
9. Now, switch to the CyberGhost page and click on Start trial button.
Account confirmed
CEH Lab Manual Page 324 Ethical Hacking and Countermeasures Copyright © by E6-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
10. The CyberGhost VPN window appears, click the Settings icon.
CyberGhost VPN
Connect to:
CEH Lab Manual Page 325 Ethical Hacking and Countermeasures Copyright © by E6-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
11. The Settings window appears, click on CyberGhost VPN icon 1 © ji under Menu icon
Settings
MTU size
If you are experiencing speed issues, we recommend changing this settingto “Small” or “Auto” which will
improve VPN performance.
Default v
CEH Lab Manual Page 326 Ethical Hacking and Countermeasures Copyright © by E6-Coumt
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
12. The CyberGhost VPN window appears; click on All servers from the left-hand pane.
Note: The list of the servers may vary in your lab environment
Favorite
Dedicated 1p
For Gaming
For torrenting
For streaming
For streaming
BP vores ngtom
“ay 9
ME rited States
Privacy settings
Smart rules
Upgrade now
CEH Lab Manual Page 327 Ethical Hacking and Countermeasures Copyright © by E6-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
13. Click to select any proxy server from the available options in the All servers section (here,
Albania) and click on the power icon OF under Start a Connection as shown in the
screenshot.
r
All servers
¢ Algeria 6673km YY
a) Andorra eoisim 9Y
OP tigentina 1sstoKm
_ Connect to:
@ vvresis 3oezim YY kaa
@® wI0 wo3s2km 9Y >
Be
w
Austria 5375km
ea
VYbaiAy
e) Bangladesh 1550km $Y
"
Note: If the CyberGhost window appears indicating that all free user slots are booked, then
close the window and select another proxy server from the “all servers” list.
CEH Lab Manual Page 328 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
@ w= s1ssim ff
€ se8 6673km YY
@ Andorra 6615km VY
~3) nigentva 15810km YY. ‘
ww
a Armenia 30e2km 9
@ Australia 10382km 7 %
cl
w
Austria 5375km we
© wsromes 13210km YY
e) Bangladesh 1550km TY
CEH Lab Manual Page 329 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
15. Minimize the CyberGhost window and launch the Mozilla Firefox web browser; type the
URL https://whatismyipaddress.com/location-feedback in the address bar and press
Enter.
My IP IP LOOKUP HIDE MY IP
UPDATE GEOLOCATION
(CEH Lab Manual Page 330 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
17. Open a new tab in the web browser and surf anonymously using this proxy.
certifiedhacker.com
Jocortior
a i one RB a
HOME ABOUT PORTFOLIO BLOG CONTACT
18. Once you are done browsing, in the CyberGhost window, click the Power icon to disconnect
the proxy, as shown in the screenshot.
r
All servers
very single ur CyberGhost VPN se Tak urvP :
Name ~ Distance Favorite
CyberGhost VPN
@ x our00 descata w OD
[ ] Albania 5155km 9
€ Algeria 66r3km ¥¥
ateOD tagent
a 15810km Ww
a Armenia 3082km = ¥Y
S Austria 5375km YY
@ ‘ersten 1s50km ¥¥
bk
CEH Lab Manual Page 331 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 03 - Scanning Networks
19. This concludes the demonstration of anonymously surfing the Internet using CyberGhost.
20. Close all open windows and document all the acquired information.
21. Navigate to Control Panel > Programs > Programs and Features and uninstall the
CyberGhost 8 application.
Lab Analysis
Analyze and document the results of this lab exercise.
PLEASE TALK TO YOUR INSTRUCTOR IF YOU HAVE QUESTIONS RELATED TO THIS LAB.
M Yes
Platform Supported
M1 Classroom
CEH Lab Manual Page 332 Ethical Hacking and Countermeasures Copyright © by E6-Council
All Rights Reserved. Reproduction is Strictly Prohibited.