0% found this document useful (0 votes)
618 views

Ethical Hacking Practicals

The document describes how to use various network scanning and enumeration tools. It provides step-by-step instructions for using tools like Traceroute, Ping, Nslookup, SmartWhois, Google Hacking, email tracking, Advanced IP Scanner, Nmap, CurrPorts, LANSurveyor, Colasoft Packet Builder, The Dude, SuperScan, NETBIOS enumerator, SoftPerfect Network Scanner, and Hyena. The tools are used to perform tasks like tracing routes, pinging systems, looking up DNS records, whois lookups, email tracing, port scanning, network mapping, packet crafting, and enumerating NetBIOS, SNMP, NTP, DNS and other services.

Uploaded by

Nikhil Amodkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
618 views

Ethical Hacking Practicals

The document describes how to use various network scanning and enumeration tools. It provides step-by-step instructions for using tools like Traceroute, Ping, Nslookup, SmartWhois, Google Hacking, email tracking, Advanced IP Scanner, Nmap, CurrPorts, LANSurveyor, Colasoft Packet Builder, The Dude, SuperScan, NETBIOS enumerator, SoftPerfect Network Scanner, and Hyena. The tools are used to perform tasks like tracing routes, pinging systems, looking up DNS records, whois lookups, email tracing, port scanning, network mapping, packet crafting, and enumerating NetBIOS, SNMP, NTP, DNS and other services.

Uploaded by

Nikhil Amodkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 45

Amodkar Yogesh R.

Practical No.1

Aim: Using the tools for whois, traceroute, email tracking, google hacking.

 Traceroute
 Ping Utility
 nslookup
 SmartWhois
 Google Hacking
 Email Tracking

Solution :

1] Traceroute (Tracert):

1
Amodkar Yogesh R.

2
Amodkar Yogesh R.

2] Ping Utility:

3
Amodkar Yogesh R.

4
Amodkar Yogesh R.

3] nslookup:

5
Amodkar Yogesh R.

nslookup interactive mode, type set type=cname and press Enter

nslookup interactive mode, type set type= hinfo and press Enter.

nslookup interactive mode, type set type= mb and press Enter.

6
Amodkar Yogesh R.

nslookup interactive mode, type set type=mx and press Enter.

4] SmartWhois

After the successful installation of SmartWhois you will get following interface

7
Amodkar Yogesh R.

Type an IP address , hostname or domain name in the tab field

8
Amodkar Yogesh R.

Open the WHO.is website

9
Amodkar Yogesh R.

10
Amodkar Yogesh R.

5] Google Hacking

Open the www.google.com and search inurl:view/index.shtml to view the live unsecure CCTV
footage.

11
Amodkar Yogesh R.

6] Email Tracking

Step1: Open eMailtrackerpro.

12
Amodkar Yogesh R.

Sep2: Click on setup an account. Fill the fields.

Step 3: Now click on test and then click on ok.

13
Amodkar Yogesh R.

Step 4: Right click on email and click on trace.

Step 5: Tracing the email.

14
Amodkar Yogesh R.

Practical No.2

Aim: Using the tools for scanning network, IP fragmentation, war dialing countermeasures, SSL
Proxy, Censorship circumvention.

 Advanced IP Scanner
 Nmap
 CurrPorts Tool
 LANSurveyor
 Colasoft Packet Builder
 The Dude

Solution:

1] Advanced IP Scanner

1)After successful installation of the software, launch the tool.

2) click on scan:

15
Amodkar Yogesh R.

Right-click any of die detected IP addresses. It will list Wake-On-LAN, Shut down and Abort

16
Amodkar Yogesh R.

2] Nmap

Open the Nmap.

Enter the IP address/website name in the target field and click on scan.

17
Amodkar Yogesh R.

Click on Nmap output, Ports/ host, Topology and host details to see Scanned detail of network.

18
Amodkar Yogesh R.

19
Amodkar Yogesh R.

Now click on the service tab located in the right pane of the windows, this will display the list of
services. Now click the http service to list all the http hostname /IP Addresses port, and their
states

Click the msrpc service to list all the Microsoft windows RPC

Click the netbios-ssn service to list all NetBIOS hostnames.

20
Amodkar Yogesh R.

3] CurrPorts Tool

Launch Currports using administrator privileges

21
Amodkar Yogesh R.

Currports lists all the processes and there ids protocols used local and remote IP address, local
and remote ports and remote host names

To view all the reports as an html page, click view -> HTML Reports –All Items

The HTML report automatically opens using the default browser

22
Amodkar Yogesh R.

To view the properties of the port ,select the port and click File -> Properties

23
Amodkar Yogesh R.

To close a TCP connection you think , select the process and click File -> Close Selected TCP
Connections

4] LANSurveyor

Click on the LANSurvyor app to open the LANSurvyor window

24
Amodkar Yogesh R.

The Create A Network Map window will appears; in order to draw a network diagram enter the
IP address in Begin Address and End Address, and click Start Network Discovery

25
Amodkar Yogesh R.

The entered IP address mapping process will display as shown in the following figure

26
Amodkar Yogesh R.

5]Colasoft Packet Builder

Install and Launch the Colasoft Packet Builder.

Before starting your task check that Adapter stings are set to Default and then click OK.

27
Amodkar Yogesh R.

To add or create the packet, Click Add in the menu section.

When an Add Packet dialog box pops IP, you need to select the template and click OK.

You can view the added packets list on your right-hand side of your window.

28
Amodkar Yogesh R.

To send all packets at one time, click Send all from the menu bar.

Check the Burst Mode option in the Send All Packets dialog window, and then click Start.

To export the packets sent from the File Menu, select File->Export->All Packets.

29
Amodkar Yogesh R.

6] The Dude

Install Dude tool and click on start, then following screen appears

30
Amodkar Yogesh R.

Click discover and scanning begins

Then it shows the network connection

31
Amodkar Yogesh R.

Click on arrow down to see history actions, files, tools, logs and so on

32
Amodkar Yogesh R.

Practical No.3

Aim: Using NETBIOS Enumeration tool, SNMP Enumeration tool, LINUX/ UNIX.
enumeration tools, NTP Enumeration tool, DNS analyzing and enumeration tool.

 SuperScan
 NETBIOS
 SoftPerfect Network Scanner
 Hyena

Solution:

1] SuperScan

1) Launch SuperScan

2) Click on windows Enumeration tab located on top menu

33
Amodkar Yogesh R.

Enter host name IP address of target machine, check the type of enumeration, and click on
enumerate

Superscan enumerates and the result is shown in the right pane of the window

34
Amodkar Yogesh R.

2] NetBIOS Enumerator Tool

1) Launch NetBIOS enumerator

2) In the IP range to scan enter the ip range

3) Click scan

35
Amodkar Yogesh R.

3] SoftPerfect Network Scanner

1) Launch SoftPerfect Network Scanner by double clicking on netScan.exe

2) To start scanning network enter the ip range and start scanning

36
Amodkar Yogesh R.

To view the properties of the individual ip address ,right click that ip address and select the
properties

37
Amodkar Yogesh R.

4] Hyena

1) Install Hyena and open it.

38
Amodkar Yogesh R.

Click + to expand the local work station and click Users.

To check the services running on the system double click on services

39
Amodkar Yogesh R.

To check the users, schedule jobs click + to expand it.

40
Amodkar Yogesh R.

Practical No.4

Aim: Using System Hacking tools.

 ADS Spy
 Stealth Files Tool

Solution:

1] ADS Spy

1) Install the ADS Spy and open it.

41
Amodkar Yogesh R.

2) Start an appropriate scan that you need.

3) Click Scan the system for alternate data streams.

To remove the Alternate Data Stream, click Remove selected streams.

42
Amodkar Yogesh R.

2] Stealth Files Tool

1. Follow the wizard-driven installation instructions to install Stealth Files Tool.

2. Launch Notepad and write any data and save the file as Readme.txt on the desktop.

The main window of Stealth Files 4.0 is as below.

43
Amodkar Yogesh R.

Click Hide Files to start the process of hiding the files.

Click Add files.

44
Amodkar Yogesh R.

 In Step l, add the Calc.exe from c:\windows\system32\calc.exe.


 In Step 2, choose the carrier file and add the file Readme.txt from the desktop.
 In Step 3, choose a password.
 Click Hide Files.
 It will hide the file calc .exe inside the readme.txt located on the desktop.
 Open the notepad and check the file; calc.exe is copied inside it.

45

You might also like