Troubleshooting Using Megaping

Filed in Uncategorized
  1. Download megaping and finish the wizard installation. After finish all the installation, launch megaping and will show the agreement. Click agree and the GUI will appear on screen.

2.  Select IP scanner from the left pane of the window, set the IP range, then click start

3. Result indicates all the IP address on the selected range with TTL, Status, host stats.

4. Right click on the IP, traceroute it

5. Megaping will show the traceroute and display number of hops to reach the server

6. Select Port Scanner from left pane, enter IP address then click add.

7. Check the IP address, then start the port scanner

8. Port scanner shows the port type, keyword, risk, port number, description.

Posted by :

Bonfilio Aldrino Sugiarto – CS2020 – 2001611794

Using HPING3`

Filed in Uncategorized
  1. Launch Hping3 from command terminal by typing hping3 and press enter or through application.

2. After hping3 shows up in the terminal, type hping3 -c 3 <IP address of target machine> then press enter

3. After that command, the output will indicate that the packets was received  and sent

4. Next, type hping3 –scan 1-3000 -S <IP address of target> where –scan defines the port range to scan and -S shows the SYN flag

5. The output indicates the open ports from the IP target.

6. Then, use UDP packet crafting, type hping3 <IP address of target> –udp –rand-source –data 500, then enter. This condition, target is running windows 8.1

    7. Open the windows 8.1 and launch wireshark to observe UDP  packets

    8. Double click to see details, then close wireshark windows and quit without saving.

9. Launch  wireshark again and leave it running behind, after that send TCP SYN to the target. Type hping3 -S <IP Address of target> -p 80 -c 5 then enter

10. The output shows that TCP packets sent through port 80 to the target

11. Open wireshark again to observe TCP packets captured by wireshark, restart to start new capture

12. Back to Kali again, flood the TCP packets to target. Type hping3 <IP address target> –flood then enter

13. After floods to the target, it will respond in terminal

14. Switch back to wireshark, and see how the TCP packets flooding from the attacker

15. Double click to see more detail information regarding TCP packets sent from attacker to target

Posted by :

Bonfilio Aldrino Sugiarto – CS2020 – 2001611794